Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Setup.exe

Overview

General Information

Sample name:Setup.exe
Analysis ID:1570754
MD5:35874e6f90e4b9b6db01d06ddc711f2c
SHA1:247d4310594364356cb4cc3fb1b3bb15327cdd9c
SHA256:9c9f34c8f3fd24a4197aac078985edb782bb13dcd7d830130d8a0d41fd49b9f8
Tags:exeuser-aachum
Infos:

Detection

LummaC Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Sample uses string decryption to hide its real strings
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Suspicious Copy From or To System Directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Setup.exe (PID: 6488 cmdline: "C:\Users\user\Desktop\Setup.exe" MD5: 35874E6F90E4B9B6DB01D06DDC711F2C)
    • cmd.exe (PID: 6600 cmdline: "C:\Windows\System32\cmd.exe" /c copy Were Were.cmd && Were.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 6616 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 6840 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 6872 cmdline: findstr /I "wrsa opssvc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 6980 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7060 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 5480 cmdline: cmd /c md 485687 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 4180 cmdline: findstr /V "ADDITIONALLYPURCHASEDNEWLYLAUNDRYASSISTSHELPLESWRIGHT" Permitted MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 2496 cmdline: cmd /c copy /b ..\College + ..\Shelter + ..\Defects + ..\Populations + ..\Alive + ..\Bus k MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Introduces.com (PID: 3452 cmdline: Introduces.com k MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11)
      • choice.exe (PID: 3192 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
{"C2 url": ["formy-spill.biz", "covery-mover.biz", "lumzulyj.shop", "zinc-sneark.biz", "dare-curbys.biz", "dwell-exclaim.biz", "impend-differ.biz", "print-vexer.biz", "se-blurry.biz"]}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    decrypted.memstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c copy Were Were.cmd && Were.cmd, CommandLine: "C:\Windows\System32\cmd.exe" /c copy Were Were.cmd && Were.cmd, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\Setup.exe", ParentImage: C:\Users\user\Desktop\Setup.exe, ParentProcessId: 6488, ParentProcessName: Setup.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c copy Were Were.cmd && Were.cmd, ProcessId: 6600, ProcessName: cmd.exe

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c copy Were Were.cmd && Were.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6600, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 7060, ProcessName: findstr.exe
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-08T01:38:54.544319+010020283713Unknown Traffic192.168.2.449820104.21.24.90443TCP
      2024-12-08T01:38:56.908064+010020283713Unknown Traffic192.168.2.449826104.21.24.90443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-08T01:38:56.501008+010020546531A Network Trojan was detected192.168.2.449820104.21.24.90443TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-12-08T01:38:56.501008+010020498361A Network Trojan was detected192.168.2.449820104.21.24.90443TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: https://lumzulyj.shop/apiAvira URL Cloud: Label: malware
      Source: lumzulyj.shopAvira URL Cloud: Label: malware
      Source: https://lumzulyj.shop/Avira URL Cloud: Label: malware
      Source: https://lumzulyj.shop:443/apiAvira URL Cloud: Label: malware
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["formy-spill.biz", "covery-mover.biz", "lumzulyj.shop", "zinc-sneark.biz", "dare-curbys.biz", "dwell-exclaim.biz", "impend-differ.biz", "print-vexer.biz", "se-blurry.biz"]}
      Source: Setup.exeReversingLabs: Detection: 18%
      Source: Setup.exeVirustotal: Detection: 15%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.9% probability
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: impend-differ.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: print-vexer.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: dare-curbys.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: covery-mover.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: formy-spill.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: dwell-exclaim.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: zinc-sneark.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: se-blurry.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: lumzulyj.shop
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: impend-differ.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: print-vexer.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: dare-curbys.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: covery-mover.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: formy-spill.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: dwell-exclaim.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: zinc-sneark.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: se-blurry.biz
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: lumzulyj.shop
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
      Source: 0000000A.00000003.2633026551.0000000001411000.00000004.00000800.00020000.00000000.sdmpString decryptor: Workgroup: -
      Source: Setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 104.21.24.90:443 -> 192.168.2.4:49820 version: TLS 1.2
      Source: Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A54005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00A54005
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00A5C2FF
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_00A5494A
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_00A5CD9F
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5CD14 FindFirstFileW,FindClose,10_2_00A5CD14
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00A5F5D8
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00A5F735
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00A5FA36
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A53CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00A53CE2
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\485687Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\485687\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49820 -> 104.21.24.90:443
      Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49820 -> 104.21.24.90:443
      Source: Malware configuration extractorURLs: formy-spill.biz
      Source: Malware configuration extractorURLs: covery-mover.biz
      Source: Malware configuration extractorURLs: lumzulyj.shop
      Source: Malware configuration extractorURLs: zinc-sneark.biz
      Source: Malware configuration extractorURLs: dare-curbys.biz
      Source: Malware configuration extractorURLs: dwell-exclaim.biz
      Source: Malware configuration extractorURLs: impend-differ.biz
      Source: Malware configuration extractorURLs: print-vexer.biz
      Source: Malware configuration extractorURLs: se-blurry.biz
      Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
      Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49826 -> 104.21.24.90:443
      Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49820 -> 104.21.24.90:443
      Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: lumzulyj.shop
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A629BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,10_2_00A629BA
      Source: global trafficDNS traffic detected: DNS query: tLlYhvSbrTRqhxpzIwTuQjRbuHJm.tLlYhvSbrTRqhxpzIwTuQjRbuHJm
      Source: global trafficDNS traffic detected: DNS query: lumzulyj.shop
      Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: lumzulyj.shop
      Source: Setup.exeString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
      Source: Setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
      Source: Setup.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: Setup.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
      Source: Setup.exeString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Cardiff.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Diy.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Diy.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Cardiff.0.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
      Source: Setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
      Source: Setup.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: Setup.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
      Source: Setup.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: Setup.exeString found in binary or memory: http://ocsp.digicert.com0
      Source: Setup.exeString found in binary or memory: http://ocsp.digicert.com0A
      Source: Setup.exeString found in binary or memory: http://ocsp.entrust.net02
      Source: Setup.exeString found in binary or memory: http://ocsp.entrust.net03
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Diy.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Cardiff.0.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Diy.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Diy.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Cardiff.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
      Source: Introduces.com, 0000000A.00000000.1707960081.0000000000AB9000.00000002.00000001.01000000.00000007.sdmp, Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Diy.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
      Source: Setup.exeString found in binary or memory: http://www.digicert.com/CPS0
      Source: Setup.exeString found in binary or memory: http://www.entrust.net/rpa03
      Source: Introduces.com, 0000000A.00000002.2692011561.0000000001410000.00000004.00000800.00020000.00000000.sdmp, Introduces.com, 0000000A.00000002.2691661811.0000000001314000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lumzulyj.shop/
      Source: Introduces.com, 0000000A.00000002.2691661811.00000000012DD000.00000004.00000020.00020000.00000000.sdmp, Introduces.com, 0000000A.00000002.2691276616.0000000001116000.00000004.00000020.00020000.00000000.sdmp, Introduces.com, 0000000A.00000002.2692011561.0000000001410000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lumzulyj.shop/api
      Source: Introduces.com, 0000000A.00000002.2691276616.0000000001116000.00000004.00000020.00020000.00000000.sdmp, Introduces.com, 0000000A.00000002.2692011561.0000000001410000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lumzulyj.shop:443/api
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Diy.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
      Source: Setup.exeString found in binary or memory: https://www.entrust.net/rpa0
      Source: Introduces.com.1.dr, Cardiff.0.dr, Diy.0.drString found in binary or memory: https://www.globalsign.com/repository/0
      Source: Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Cardiff.0.drString found in binary or memory: https://www.globalsign.com/repository/06
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49820
      Source: unknownNetwork traffic detected: HTTP traffic on port 49820 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49826 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49826
      Source: unknownHTTPS traffic detected: 104.21.24.90:443 -> 192.168.2.4:49820 version: TLS 1.2
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050F9
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A64830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_00A64830
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A64632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,10_2_00A64632
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A7D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_00A7D164
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A10E38 CloseHandle,NtProtectVirtualMemory,10_2_00A10E38
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A542D5: CreateFileW,DeviceIoControl,CloseHandle,10_2_00A542D5
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A48F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,10_2_00A48F2E
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,InitOnceBeginInitialize,ExitWindowsEx,0_2_004038AF
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A55778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,10_2_00A55778
      Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Windows\AsciiCroatiaJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Windows\JudgesCognitiveJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Windows\StarterConsiderableJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Windows\ShitAndrewsJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Windows\OffshoreGuyanaJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_0040737E0_2_0040737E
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406EFE0_2_00406EFE
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004079A20_2_004079A2
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004049A80_2_004049A8
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_009FB02010_2_009FB020
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_009F94E010_2_009F94E0
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_009F9C8010_2_009F9C80
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A123F510_2_00A123F5
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A7840010_2_00A78400
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A2650210_2_00A26502
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_009FE6F010_2_009FE6F0
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A2265E10_2_00A2265E
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A1282A10_2_00A1282A
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A289BF10_2_00A289BF
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A70A3A10_2_00A70A3A
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A26A7410_2_00A26A74
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A00BE010_2_00A00BE0
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A4EDB210_2_00A4EDB2
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A1CD5110_2_00A1CD51
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A70EB710_2_00A70EB7
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A58E4410_2_00A58E44
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A26FE610_2_00A26FE6
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A133B710_2_00A133B7
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A1F40910_2_00A1F409
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A0D45D10_2_00A0D45D
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A116B410_2_00A116B4
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_009FF6A010_2_009FF6A0
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A0F62810_2_00A0F628
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_009F166310_2_009F1663
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A178C310_2_00A178C3
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A1DBA510_2_00A1DBA5
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A11BA810_2_00A11BA8
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A29CE510_2_00A29CE5
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A0DD2810_2_00A0DD28
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A11FC010_2_00A11FC0
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A1BFD610_2_00A1BFD6
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\485687\Introduces.com 865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: String function: 00A01A36 appears 34 times
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: String function: 00A10D17 appears 70 times
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: String function: 00A18B30 appears 42 times
      Source: C:\Users\user\Desktop\Setup.exeCode function: String function: 004062CF appears 58 times
      Source: Setup.exeStatic PE information: invalid certificate
      Source: Setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
      Source: classification engineClassification label: mal100.troj.evad.winEXE@22/13@2/1
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5A6AD GetLastError,FormatMessageW,10_2_00A5A6AD
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A48DE9 AdjustTokenPrivileges,CloseHandle,10_2_00A48DE9
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A49399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,10_2_00A49399
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044D1
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A54148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,10_2_00A54148
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,10_2_00A5443D
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6616:120:WilError_03
      Source: C:\Users\user\Desktop\Setup.exeFile created: C:\Users\user\AppData\Local\Temp\nszAD7.tmpJump to behavior
      Source: Setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
      Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
      Source: C:\Users\user\Desktop\Setup.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Setup.exeReversingLabs: Detection: 18%
      Source: Setup.exeVirustotal: Detection: 15%
      Source: C:\Users\user\Desktop\Setup.exeFile read: C:\Users\user\Desktop\Setup.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Setup.exe "C:\Users\user\Desktop\Setup.exe"
      Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Were Were.cmd && Were.cmd
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 485687
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "ADDITIONALLYPURCHASEDNEWLYLAUNDRYASSISTSHELPLESWRIGHT" Permitted
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\College + ..\Shelter + ..\Defects + ..\Populations + ..\Alive + ..\Bus k
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\485687\Introduces.com Introduces.com k
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
      Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Were Were.cmd && Were.cmdJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 485687Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "ADDITIONALLYPURCHASEDNEWLYLAUNDRYASSISTSHELPLESWRIGHT" Permitted Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\College + ..\Shelter + ..\Defects + ..\Populations + ..\Alive + ..\Bus kJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\485687\Introduces.com Introduces.com kJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: acgenral.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: msacm32.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: winmmbase.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: version.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: napinsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: pnrpnsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: wshbth.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: nlaapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: dnsapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: winrnr.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: webio.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: dpapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: Setup.exeStatic file information: File size 73410092 > 1048576
      Source: Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A18B75 push ecx; ret 10_2_00A18B88

      Persistence and Installation Behavior

      barindex
      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\485687\Introduces.comJump to dropped file
      Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\485687\Introduces.comJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A759B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_00A759B3
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A05EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_00A05EDA
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A133B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_00A133B7
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\Setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comAPI coverage: 4.1 %
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.com TID: 7060Thread sleep time: -30000s >= -30000sJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406301 FindFirstFileW,FindClose,0_2_00406301
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CC7
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A54005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00A54005
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00A5C2FF
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_00A5494A
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_00A5CD9F
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5CD14 FindFirstFileW,FindClose,10_2_00A5CD14
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00A5F5D8
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_00A5F735
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A5FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_00A5FA36
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A53CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00A53CE2
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A05D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,10_2_00A05D13
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\485687Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\485687\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
      Source: Introduces.com, 0000000A.00000002.2691878726.00000000013E1000.00000004.00000020.00020000.00000000.sdmp, Introduces.com, 0000000A.00000002.2691661811.0000000001314000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comProcess information queried: ProcessInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A645D5 BlockInput,10_2_00A645D5
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A05240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00A05240
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A25CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,10_2_00A25CAC
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406328
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A488CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_00A488CD
      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A1A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_00A1A385
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A1A354 SetUnhandledExceptionFilter,10_2_00A1A354
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A49369 LogonUserW,10_2_00A49369
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A05240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,10_2_00A05240
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A51AC6 SendInput,keybd_event,10_2_00A51AC6
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A551E2 mouse_event,10_2_00A551E2
      Source: C:\Users\user\Desktop\Setup.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c copy Were Were.cmd && Were.cmdJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 485687Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "ADDITIONALLYPURCHASEDNEWLYLAUNDRYASSISTSHELPLESWRIGHT" Permitted Jump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\College + ..\Shelter + ..\Defects + ..\Populations + ..\Alive + ..\Bus kJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\485687\Introduces.com Introduces.com kJump to behavior
      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A488CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,10_2_00A488CD
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A54F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,10_2_00A54F1C
      Source: Introduces.com, 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmp, Introduces.com, 0000000A.00000003.2650277752.00000000017D3000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Diy.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
      Source: Introduces.comBinary or memory string: Shell_TrayWnd
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A1885B cpuid 10_2_00A1885B
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A30030 GetLocalTime,__swprintf,10_2_00A30030
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A30722 GetUserNameW,10_2_00A30722
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A2416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,10_2_00A2416A
      Source: C:\Users\user\Desktop\Setup.exeCode function: 0_2_00406831 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406831
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      Source: Introduces.comBinary or memory string: WIN_81
      Source: Introduces.comBinary or memory string: WIN_XP
      Source: Introduces.comBinary or memory string: WIN_XPe
      Source: Introduces.comBinary or memory string: WIN_VISTA
      Source: Introduces.comBinary or memory string: WIN_7
      Source: Introduces.comBinary or memory string: WIN_8
      Source: Diy.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 4USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
      Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A6696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,10_2_00A6696E
      Source: C:\Users\user\AppData\Local\Temp\485687\Introduces.comCode function: 10_2_00A66E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_00A66E32
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure2
      Valid Accounts
      11
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Exploitation for Privilege Escalation
      1
      Disable or Modify Tools
      21
      Input Capture
      2
      System Time Discovery
      Remote Services1
      Archive Collected Data
      1
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      2
      Valid Accounts
      1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      LSASS Memory1
      Account Discovery
      Remote Desktop Protocol21
      Input Capture
      11
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
      Valid Accounts
      2
      Obfuscated Files or Information
      Security Account Manager3
      File and Directory Discovery
      SMB/Windows Admin Shares3
      Clipboard Data
      2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
      Access Token Manipulation
      1
      DLL Side-Loading
      NTDS37
      System Information Discovery
      Distributed Component Object ModelInput Capture113
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
      Process Injection
      11
      Masquerading
      LSA Secrets31
      Security Software Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
      Valid Accounts
      Cached Domain Credentials1
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      Virtualization/Sandbox Evasion
      DCSync4
      Process Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
      Access Token Manipulation
      Proc Filesystem1
      Application Window Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
      Process Injection
      /etc/passwd and /etc/shadow1
      System Owner/User Discovery
      Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1570754 Sample: Setup.exe Startdate: 08/12/2024 Architecture: WINDOWS Score: 100 25 lumzulyj.shop 2->25 27 tLlYhvSbrTRqhxpzIwTuQjRbuHJm.tLlYhvSbrTRqhxpzIwTuQjRbuHJm 2->27 31 Suricata IDS alerts for network traffic 2->31 33 Found malware configuration 2->33 35 Antivirus detection for URL or domain 2->35 37 6 other signatures 2->37 8 Setup.exe 23 2->8         started        signatures3 process4 process5 10 cmd.exe 3 8->10         started        file6 23 C:\Users\user\AppData\...\Introduces.com, PE32 10->23 dropped 39 Drops PE files with a suspicious file extension 10->39 14 Introduces.com 10->14         started        17 cmd.exe 2 10->17         started        19 conhost.exe 10->19         started        21 7 other processes 10->21 signatures7 process8 dnsIp9 29 lumzulyj.shop 104.21.24.90, 443, 49820, 49826 CLOUDFLARENETUS United States 14->29

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Setup.exe18%ReversingLabs
      Setup.exe16%VirustotalBrowse
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\485687\Introduces.com3%ReversingLabs
      No Antivirus matches
      SourceDetectionScannerLabelLink
      lumzulyj.shop4%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://lumzulyj.shop/api100%Avira URL Cloudmalware
      lumzulyj.shop100%Avira URL Cloudmalware
      https://lumzulyj.shop/100%Avira URL Cloudmalware
      http://ocsp.entrust.net020%Avira URL Cloudsafe
      https://lumzulyj.shop:443/api100%Avira URL Cloudmalware
      lumzulyj.shop4%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      lumzulyj.shop
      104.21.24.90
      truetrueunknown
      tLlYhvSbrTRqhxpzIwTuQjRbuHJm.tLlYhvSbrTRqhxpzIwTuQjRbuHJm
      unknown
      unknownfalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        dare-curbys.bizfalse
          high
          impend-differ.bizfalse
            high
            lumzulyj.shoptrue
            • 4%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            zinc-sneark.bizfalse
              high
              covery-mover.bizfalse
                high
                https://lumzulyj.shop/apitrue
                • Avira URL Cloud: malware
                unknown
                formy-spill.bizfalse
                  high
                  se-blurry.bizfalse
                    high
                    print-vexer.bizfalse
                      high
                      dwell-exclaim.bizfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.autoitscript.com/autoit3/JIntroduces.com, 0000000A.00000000.1707960081.0000000000AB9000.00000002.00000001.01000000.00000007.sdmp, Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Diy.0.drfalse
                          high
                          http://ocsp.entrust.net03Setup.exefalse
                            high
                            http://ocsp.entrust.net02Setup.exefalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.entrust.net/rpa03Setup.exefalse
                              high
                              https://lumzulyj.shop:443/apiIntroduces.com, 0000000A.00000002.2691276616.0000000001116000.00000004.00000020.00020000.00000000.sdmp, Introduces.com, 0000000A.00000002.2692011561.0000000001410000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://aia.entrust.net/ts1-chain256.cer01Setup.exefalse
                                high
                                http://nsis.sf.net/NSIS_ErrorErrorSetup.exefalse
                                  high
                                  http://crl.entrust.net/ts1ca.crl0Setup.exefalse
                                    high
                                    https://www.autoitscript.com/autoit3/Introduces.com, 0000000A.00000003.2650277752.00000000017E1000.00000004.00000800.00020000.00000000.sdmp, Introduces.com.1.dr, Diy.0.drfalse
                                      high
                                      https://lumzulyj.shop/Introduces.com, 0000000A.00000002.2692011561.0000000001410000.00000004.00000800.00020000.00000000.sdmp, Introduces.com, 0000000A.00000002.2691661811.0000000001314000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      http://crl.entrust.net/2048ca.crl0Setup.exefalse
                                        high
                                        https://www.entrust.net/rpa0Setup.exefalse
                                          high
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          104.21.24.90
                                          lumzulyj.shopUnited States
                                          13335CLOUDFLARENETUStrue
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1570754
                                          Start date and time:2024-12-08 01:36:22 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 6m 37s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:16
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:Setup.exe
                                          Detection:MAL
                                          Classification:mal100.troj.evad.winEXE@22/13@2/1
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 100%
                                          • Number of executed functions: 86
                                          • Number of non-executed functions: 306
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtSetInformationFile calls found.
                                          TimeTypeDescription
                                          19:37:15API Interceptor1x Sleep call for process: Setup.exe modified
                                          19:37:18API Interceptor1932x Sleep call for process: Introduces.com modified
                                          No context
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          CLOUDFLARENETUSmeerkat.mips.elfGet hashmaliciousMiraiBrowse
                                          • 8.44.96.113
                                          file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, VidarBrowse
                                          • 172.67.165.166
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.21.16.9
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 172.67.165.166
                                          file.exeGet hashmaliciousAmadey, LummaC Stealer, StealcBrowse
                                          • 172.67.165.166
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.21.16.9
                                          file.exeGet hashmaliciousUnknownBrowse
                                          • 104.21.35.78
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 172.67.165.166
                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                          • 104.21.16.9
                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                          • 172.67.165.166
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, VidarBrowse
                                          • 104.21.24.90
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.21.24.90
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.21.24.90
                                          file.exeGet hashmaliciousAmadey, LummaC Stealer, StealcBrowse
                                          • 104.21.24.90
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.21.24.90
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.21.24.90
                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                          • 104.21.24.90
                                          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                          • 104.21.24.90
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.21.24.90
                                          file.exeGet hashmaliciousLummaC StealerBrowse
                                          • 104.21.24.90
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Users\user\AppData\Local\Temp\485687\Introduces.comJSWunwO4rS.lnkGet hashmaliciousLummaC StealerBrowse
                                            Yn13dTQdcW.exeGet hashmaliciousVidarBrowse
                                              DM6vAAgoCw.exeGet hashmaliciousOrcus, XmrigBrowse
                                                Setup.exeGet hashmaliciousVidarBrowse
                                                  Setup.exeGet hashmaliciousVidarBrowse
                                                    Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                      xoJxSAotVM.exeGet hashmaliciousVidarBrowse
                                                        ton.exeGet hashmaliciousVidarBrowse
                                                          ton.exeGet hashmaliciousVidarBrowse
                                                            File.exeGet hashmaliciousOrcus, XmrigBrowse
                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Category:modified
                                                              Size (bytes):893608
                                                              Entropy (8bit):6.620254876639106
                                                              Encrypted:false
                                                              SSDEEP:12288:DpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31troPTdFqgaAV2M0L:DT3E53Myyzl0hMf1te7xaA8M0L
                                                              MD5:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                              SHA1:F2F57024C7CC3F9FF5F999EE20C4F5C38BFC20A2
                                                              SHA-256:865347471135BB5459AD0E647E75A14AD91424B6F13A5C05D9ECD9183A8A1CF4
                                                              SHA-512:57D56DE2BB882F491E633972003D7C6562EF2758C3731B913FF4D15379ADA575062F4DE2A48CA6D6D9241852A5B8A007F52792753FD8D8FEE85B9A218714EFD0
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: ReversingLabs, Detection: 3%
                                                              Joe Sandbox View:
                                                              • Filename: JSWunwO4rS.lnk, Detection: malicious, Browse
                                                              • Filename: Yn13dTQdcW.exe, Detection: malicious, Browse
                                                              • Filename: DM6vAAgoCw.exe, Detection: malicious, Browse
                                                              • Filename: Setup.exe, Detection: malicious, Browse
                                                              • Filename: Setup.exe, Detection: malicious, Browse
                                                              • Filename: Setup.exe, Detection: malicious, Browse
                                                              • Filename: xoJxSAotVM.exe, Detection: malicious, Browse
                                                              • Filename: ton.exe, Detection: malicious, Browse
                                                              • Filename: ton.exe, Detection: malicious, Browse
                                                              • Filename: File.exe, Detection: malicious, Browse
                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):440069
                                                              Entropy (8bit):7.9996447588754656
                                                              Encrypted:true
                                                              SSDEEP:12288:GA9UZLdysmEbOfyVH/Eos58dB1lhxqsI+z:GRLdBifyHsWdB1km
                                                              MD5:4C1F2FE088A9CE12A514C242E4C775EB
                                                              SHA1:9DDDAD48AFB769FBE1BABA73F19924F1F428B9E0
                                                              SHA-256:72423545A9D5B21825F323BCDBE7A183D619BCF1D6C35ECD53A0CD69A40B75E4
                                                              SHA-512:58B93AC9FF8B05DFE6B6A9D4C185D51069605C57986AC947E499EE44AADA7C4113A0A9D02763B782E7ECBFCF1D12E098B45FBE223DF232335CB63E0B68C4C7EB
                                                              Malicious:false
                                                              Preview:+L..y....{HW`.1.x.&.3^h.....yo.......4T.Eni@.......... 4_.2...o...z...:.....U....#..q..|b".i.^.u..U.2..+.".Q||`..nL.....!=.m.....@..g.k?..u.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....Rz...N.;.'.F...h.............kE..+S..kE..+S..kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..t.#..,P..Myn.2..t.W....83...8....0.kE..F...kE..+S..m........r8.5...x..2(.U.j...."e.t#.A.....|).....=.)....h..u,@..!..2.-..........4.S...pw..aU.-"].VQGhg...g.....I...[..~.....m..!.......Q.FG...,g.......U5.7o0.L..im....k..3.r..*{).?F.I.?...v6Z0m]r...,.]>.......[..d...bC.v9.]Z......;Dlg.[.V.g._....l.>.....(.N..T).}..L..~'....u.|....k%F.....|@t..NMw++...V.o.......5...0..Z....I.H.......Zy.......C.O.Q.(....}.
                                                              Process:C:\Users\user\Desktop\Setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):66560
                                                              Entropy (8bit):7.99728583023769
                                                              Encrypted:true
                                                              SSDEEP:1536:UJrvJdKZY2Rx/YfH8Gr9O2r8J1qiYSBYO7tCzgGMIKdFwtz:0hqBRqkG5D8rZBYP0lhi
                                                              MD5:565E3B514557977EC79DC9DDFF6573D5
                                                              SHA1:CA09901469FF3E9E0B49C20C212E888F9098CFBA
                                                              SHA-256:05B297F4F7F4332226D5A19D53623B6EA4762454AEFC2F2C8BF316736BB0949D
                                                              SHA-512:1CD9AD5A71D5335BBC45595ACA60595791FD0C0F51BA681DEE4604A80F013B95EE40D2ECDC8A44B595F3D8BC9E451934630D42FE1E8469B8A8671236F67ECF86
                                                              Malicious:false
                                                              Preview:..]O.Z..8...C...I..H..v.g.........@.o8;{x..t.j#...b..>........e ZtR....y.k...{..=.'.7......8...O..p._+^....l._.0.'.Z....Gn..UZ(G..,.6H.bR.Gj..N.}^#'.......X.iWZx......r7Q..d..O..._8....V.l.[.'...N..`.}..y...%...$......)....EZ%..n.......E.@...l&..C.....[.....Ac....U..%.;j*.b..5@/...n.....$.s=..j..i....'..%..J+w.....0H.0.>0>.........Jh.g{......-.....~@..q"A6uv.Xw..L...?........T.h.....[2...ECY..A...h.lB.v...b.x....'......D'.....W."m.t.f.-H.C$...)0}.s.d.#k."l.....d.A....vFa..^..5g\7p'uE.X..).t..... %...Nc..^L.......Ek(rG..H}..rC.m...9.K....>...u..2.^....4y..|p.l.c...?.T...cK..Yfsc........jf.WT4P.3g16... ..L\hTH...n#......X.4c)):.\.......h?.Q.. J!...5..[...q..DM....<...m.{."j....)..p<L]yP..........OL..K,........0.c...mH..g.*39{.i....rsX.*.A.3.UK.).j....8!@3..1...d..X..~.z...5..n........1....G<.....?"...j..z.Oc...3..8.^......~.+.-.!;0s....s.....E.L...T_..7....DH;.7..3Y..I...w...u.HD....S.&-.......v.Ft.H..V&zQ...E....S. ......`.....|.....U...7....W...\B
                                                              Process:C:\Users\user\Desktop\Setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):45829
                                                              Entropy (8bit):7.996479460175736
                                                              Encrypted:true
                                                              SSDEEP:768:jYR0bwgxSwwFP1jfSI0tdn1wwMbon0m/RCDSYH/F166y+TMkWcn49Hht5d5lkbt5:cWMgxSw+5ShywMbonJVYfFIKTR49P5du
                                                              MD5:98D218705DAF82CC310B60BD21BB18C3
                                                              SHA1:3CC877414C559EDF069DB3F60FA01854A70B961F
                                                              SHA-256:E70B283C441E9721C476A18D5717BF41D2097415104FA509A0562E39F7FE91AF
                                                              SHA-512:E336B1BF9A0791EDB26DD012A5871FA044CEE587EB6447052E8E8287CB8F75666F645FF0588247A7E4E16D443D0F9A21AA13BEE23D591D429F9D86EA51507373
                                                              Malicious:false
                                                              Preview:6g..........+...&r."k...jpe...f..;..Qrb..h..a;H...x..p...... :....<V.S.:..@mM`B...26!t.2P...m....AzQ.:...A{_8R._.$_....w>..iL.7-u..}5..p.I..p...]VW..a......`t.....t.a.2@C7.o.S...l.8.....I...*.Z..r....}..%3>.3....z...D....]B....W..xf.E..]..H~U...CE.[`c.a.......<......}.......{......5..&.,Y8>.T..........9...^..C......9\g.. ..&......w...... P.z&.Y.R$*..e?...E.1...'Z".$..SZ...!!.cO..w[...=qT{.K..\...9.@.v.z.&..~..7......:..3G.?.(L.|...&...Q{..Q..Mp.\"4^...$.sX...Y.#.....>.O.r[W..}q....w7..I.t..0.../.].~hq.....*.>..4.!.y..h..]..M...O.E.xW.7d......yf#aLFsT#.....,.(n..)...?.`..i.>.t.:pd...9.>...../..m&q.u,.-..,.H....^s..,..U...$Bv@dF..,5..............stY.9?:m.JB...W..3.L..q1G.1.$>.)......$}3. L......y..^,.Q...JBPZ...60.6..~..h.Q....7U..QK...Vv.v.sS._....Y..`x.ag...IH.8Fs..1......0......6!..g.B..Fp....r.G....R*.64;0..x.*...w...=.w..y...o..._A#l+.l@19.".JV.....%..r.g..;.H}.yev......v....._...L.t.E.{.^z....+.iG....zl..3.)o..JP..m..-..8..K...S..p.=
                                                              Process:C:\Users\user\Desktop\Setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):3807
                                                              Entropy (8bit):7.447312722357554
                                                              Encrypted:false
                                                              SSDEEP:48:6wHTHiNa+KLpt+4SV3tGKeoOfdiH1YyNRoYzrnK0OmyOO2UKxbQ0JYcmcY1B+b/l:DHiNCLqcRVK1fy0Oo+zAbQ6YhbB+h
                                                              MD5:A69D2A6B4F024959E729837CAF86CF4E
                                                              SHA1:8A44BEB9F9CE71C40A78D079D9D2A46F020F4D5D
                                                              SHA-256:F97998F9EBD6E43498F7DC37A34FECEAFDA7E50C098EC88630421F3580C344FB
                                                              SHA-512:474702DE0F1AD23171579C18592D9B1C0E09CA25986DE807BCC22882A0004394148CD005109C32846280C345CD50A0055FB7F5FF9CE22595D663C54931AC76D3
                                                              Malicious:false
                                                              Preview:/0...*.H........0[1.0...U....BE1.0...U....GlobalSign nv-sa110/..U...(GlobalSign Timestamping CA - SHA256 - G20...170124100000Z..280224100000Z0_1.0...U....JP1.0...U....GMO GlobalSign K.K.1200..U...)GlobalSign TSA for Advanced - G3 - 001-020.."0...*.H.............0..........w..o....^H.vw*..1L.Z....`....{..'F..B.S...yu.D@....f.&.nr.....p..*>..........=.wWU......e7_./..=. .ynm.s.q..i.l9.oYYe....u....?HA...B4'.z..:...{.^%....e......U..5.-..#a.p.~...d.Cc...mI.g{.n.LF.....??...<O..7..34...a.d.^..5..+.7..!...g@W..r...E.........0...0...U...........0L..U. .E0C0A..+.....2..0402..+........&https://www.globalsign.com/repository/0...U....0.0...U.%.....0...+.......0F..U...?0=0;.9.7.5http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0....+..........0..0H..+.....0..<http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0<..+.....0..0http://ocsp2.globalsign.com/gstimestampingsha2g20...U....../...........\AK... 0...U.#..0....!.J.]d......7G.A+L0...*.H................oU1.@..)F#....y1`
                                                              Process:C:\Users\user\Desktop\Setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):99328
                                                              Entropy (8bit):7.998327299750921
                                                              Encrypted:true
                                                              SSDEEP:3072:rt0AnDGpCxR09xZHLvdxaw0U+T1aYjSfqYI:x0An9TwZHLvd07UyaYC7I
                                                              MD5:9F6A3D77E22BCF40E31E541860F7DD5A
                                                              SHA1:35E50E8E9073F8742DC36407FD2F875C07841C75
                                                              SHA-256:6390F8646BCB4DFCA1BA8F169FA92471318CB5B31CDABD28B0397FBFA20E579D
                                                              SHA-512:46916B504BCA4D96372F7BF965B08F76981874824DB7FA3D0521947A9795B2A9D4B79631B34FCC11DEA08A57A3829DDE52D3DC1B7C5EB6D659BCA929D9983902
                                                              Malicious:false
                                                              Preview:+L..y....{HW`.1.x.&.3^h.....yo.......4T.Eni@.......... 4_.2...o...z...:.....U....#..q..|b".i.^.u..U.2..+.".Q||`..nL.....!=.m.....@..g.k?..u.HK..lJ..LS...H}AU3!EA06M..s$.<.z..g....kC.R.....:!.)......@...F..k;!..u:.=..3............d.a.Mb...l.t.jxI..8.v...r.T...txH..!..)98O...,.XOg;Mm.=..A..FPWW.....Y...$c..F.Kx...i..f3.H....2)...<.9.m....&...4....Rz...N.;.'.F...h.............kE..+S..kE..+S..kC.R......%x....}...q..U-...(....%....V..?p.hf..........@.#....{'.l..v..*)~.K....dC`:.......c!.).A.&!0..~..}..h..w14.h.%.!4.A...V..+}.,{{.s.x..K....V.E...`.[..r..t.#..,P..Myn.2..t.W....83...8....0.kE..F...kE..+S..m........r8.5...x..2(.U.j...."e.t#.A.....|).....=.)....h..u,@..!..2.-..........4.S...pw..aU.-"].VQGhg...g.....I...[..~.....m..!.......Q.FG...,g.......U5.7o0.L..im....k..3.r..*{).?F.I.?...v6Z0m]r...,.]>.......[..d...bC.v9.]Z......;Dlg.[.V.g._....l.>.....(.N..T).}..L..~'....u.|....k%F.....|@t..NMw++...V.o.......5...0..Z....I.H.......Zy.......C.O.Q.(....}.
                                                              Process:C:\Users\user\Desktop\Setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):63488
                                                              Entropy (8bit):7.997078476687112
                                                              Encrypted:true
                                                              SSDEEP:1536:mDrmnUHH/zLF6WtWLWQvkCxHGXojbCFIR15B:mPmWHnFToncYjbj/L
                                                              MD5:A5183F0D4783E58750AEBDE2308A7D6B
                                                              SHA1:6F54FB220562F74DE4D31B92099E0A523F08EA6D
                                                              SHA-256:E3E40DFD03858C7C1F56F887C604E4B61453D3CB26C030C1A8B0F1CC1BAD623A
                                                              SHA-512:DFE6225FA363AE0B0AAC1FD914AD0A00E86D0FFC85F0ACBAF704E98F6AFA101711FB3B8BD386DB860D207D84C851B295D23F85824A860C75B140E1AD5702D311
                                                              Malicious:false
                                                              Preview:}.../.j4+.!u..6.l.B..M..n.H.vc....5.i..O..P.....@.Ky..b.M...6.f..B6m .I..o.\D....>..*.5.a.:.....~1.. ..\....~*.R.b.O..r...e......`..?....*U.+..6..m..t8&.l..<......1..hq>..\BI|...U..|5....#..,#ME-..u^6........7.e...X[.Q.g4..n..ywr0.LP..h..t^.N..@...|..b.X.....0.V.5{s/.P.....W/.....?..1........gx...J.f...#Q...]..'P......yA.g...........1z...rN>..+..G...G..._.|f..t...).x.w..e<fr+5]...A....2..#O..u..cl....o>W.;>.....*.....Q...j]#....Q.g.V.m...?.Y....b.X.....&^.^/r...XZ.#.O#..,...R....q..cj=....!r\1..|.2....q.S....".A5:..V.Hp..~....}.C.7.hc......AA=x...&.........(..qE...N.iH.+.yg.mB._.."uD...3......]U2r..^..u>J0....Z....Z......,..... ..z..'.Y....##..p...':.x.......C~...G*..ksR.j#t.....}(.../c.'f...Vq...W..n.Y..)...F...o..@.u..n.......E.k.J~......!..g(.RX....(...Ag.%L......U.'U.n.cPF.X..m.S.....<....S.J..."9.....bl.G...a......L..T0_....;-7..].Y-.a..].~|.E.L...`.......Y.Qu...bRt..U.......t.^..Q<./.Wj3.....S.kV......5.......0.i...F...37..Ent.3....
                                                              Process:C:\Users\user\Desktop\Setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):370688
                                                              Entropy (8bit):6.18891676515196
                                                              Encrypted:false
                                                              SSDEEP:6144:N/xcq21R1p/rAOPOei7TdFW6wgarnYNhBZ2BV8joj8:NZa31troPTdFqgaAV2M0w
                                                              MD5:4EAF9E43CEEE6A50A7D0239326AB0FB1
                                                              SHA1:BCCCDC304DE1B1AEFB3B5AC0277587DCBC2AB956
                                                              SHA-256:16FA28C967471B56ACD38E33762FBAC6DE305243A452D1288573C1E3BF89F76D
                                                              SHA-512:010E8B498E8E10A363E66B728C96321EBD36223ABBA2130D86F113CBE3E294648E1CDB476BE0C7CA907B333541F6160F7D3DC5F5FB29271AE6BBA6034FAC9C8D
                                                              Malicious:false
                                                              Preview:[..]...U..E.W...p.P.......u&V.u.....U...&.3.@j..F.P...H....,y..^.CQ.E..E.....P...H....<...j.............9......O..@........M.P..Y..3._]...U..Q.E.SVW.p...P......u'.u....GU..3.@3.S.F...P...H....x.......E.3.P..,....]..U..H..Y..u..u.....U..3.@.8].tY.u.Sh........I...H....E.QP...E......H....m...S............k......O..@.........M.P..Y......Sh....H....}..._^3.[..]...U...u..u.j.j../...]...U...u..u.j.j......]...U..V.u....u.j.j.........N..@....[....x..u+j....................N..@....3....M.P..X..3.^]...U..V.u....u.j.j........N..@.........x..u+j.............o......N..@.........M.P.#X..3.^]...U..E..u..p.Pj......]...U..E.V.u....p.Pj........N..@........x..u+j....................N..@....a....M.P.W..3.^]...U..SVW.}...........v..G..H..tU.........@.G....bU......\....u(P..<.I.P...H....Kv...u.....R...&..F....._^3.[]...U...`SV.M..M.W.....3..E.....j<Q.E..M.P.M...4...].....}....r3.G..p.....Q...F.3..f9.t..G..p.....Q...F.....G...E....r..O..q....Q...F.....G...E....r>.O..q....Q...F.3...f9
                                                              Process:C:\Users\user\Desktop\Setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):519168
                                                              Entropy (8bit):6.67172163291451
                                                              Encrypted:false
                                                              SSDEEP:12288:rpVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MQ:rT3E53Myyzl0hMQ
                                                              MD5:A3E45144E0A0900C2795A0FDC804C35C
                                                              SHA1:9DE65F88C50A4641C6FD7DB59B52D27D71B527D9
                                                              SHA-256:B3EE8E496B5382CB7D65F8AF625CC8508AE52DD9E21A03B81636CD59A99F8E5F
                                                              SHA-512:74415B81625E44DA3918F6F477D91BFEA7DF6AF39A33423E990670B113A581A82B5CA7AE60415E5DBE47AB061C4367E4EE21FF27AF4CF64B402671866A841647
                                                              Malicious:false
                                                              Preview:ADDITIONALLYPURCHASEDNEWLYLAUNDRYASSISTSHELPLESWRIGHT..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L......Z.........."...............................@.................................Jo....@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B.........................................................................................................................................................................................................................
                                                              Process:C:\Users\user\Desktop\Setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):70656
                                                              Entropy (8bit):7.997437388212893
                                                              Encrypted:true
                                                              SSDEEP:1536:Fjl7znEbwbAioKcyioj/t/XEMzrrNJPv7iYxXzJh:9Zn/vcgB1zrrNJm8Xf
                                                              MD5:CEC96F80134CFB767A35C25180C2B670
                                                              SHA1:DED9F6073B57BEBC639013A097268089482187D4
                                                              SHA-256:2B7D0A1B9F111F76EBCE4A516728E4A4D68A5259366B8AA54B329385FF8FE22B
                                                              SHA-512:AF27524AFEEF363F9C1DC2C03220D536FD89D370F2B9180DBB98B2A421EBDFB45CF70BEB43C0CDE084BD32ADD68AC5C0A7130286053CE543DA766DC8142FB828
                                                              Malicious:false
                                                              Preview:..s/..5..~..bg..O7..q..we(....'....M.x|==.....(..2rQ. E.)&..F..%.-"O....W.b..Zw.........r.;.."rME....5...".,......r..t.X.......C/..zQ.[f'x....B.+.?"0UX...!.<u....6O.}-Ov..|.m0R.Hj.i..j.A?....w..fL.....X.N.w.......8^!&.x.a...}'I.l....7&".{W;<$L=v.]..m...e. .......:X.M....e.%..+.j...:.G.....G.F...63....(..K....+6m.K'..@(.....9.H3.Q..i......%A........m3..w..-z.....oD.8..*.1....Q...B.J]....K.j4...@.'...s..p!...).?D.\.....9.@...6....L..WV.8.y..T.c.....j.v.#.]....0?>.+...1...p..H..P...o%.m*........B..7g.'.].6Zm.#w.}.\.*......&..^.GP...E)<YjPI~..0........z"Gg.;&.x..'r|..^.N.`....Q..%.(....-*O`.R`.....t.].O.6.-.z.z...?..1..mJ....2+.s...G..A...2].&\...a....9qz......... ...$.R.!....`.Wv..X.d.y..`;7..>..G~.C..*...8...7JS.`1.=...1...*........'...O0~.r...$..X.........^F/m.Lc..2m............uq'.S.N9".er..^..*p.r{.....).7...c-.z..r....Y%?I.2.?.@W.....vmy..j{p.s..v.-..]uy*.V.Mr.Y..$e(.)PV.......V..b......,4.t..2...q...*t[.E.5.]l.HNX.<..O...K.."s.5.3..
                                                              Process:C:\Users\user\Desktop\Setup.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):94208
                                                              Entropy (8bit):7.998051087615172
                                                              Encrypted:true
                                                              SSDEEP:1536:a/FULw8lRlj4uLthtoCA/ch/hsTaxr2w3WAfb5EKv2Ry0KMbGkPCoBiOIw9/5sv4:IGfLDtoFgOTax0FbbDBiOIwR5MTDnvI
                                                              MD5:F402E241CA4E9DC364B7B8C1D3EA0E41
                                                              SHA1:D9BD3947E20D45A91863596B7FFEFBAB800D0E6E
                                                              SHA-256:F2A1F689F0E93A0B4D0C25613029EE6E82DF16773C9B09903A6E967124C1A77A
                                                              SHA-512:E0CABEDEEA23EAE20CD4847B3CC3EC9CC70E47C44585044ADEC67B7D356CA2032B2C5821CB7AD548DD9FD71B60C14E234E39526C58AA2B271BC2345EB6CB3464
                                                              Malicious:false
                                                              Preview:.kW.E*...350.=....ut..;.l.&^.&.L.".,.R.s.3..c.....K.o...'C.F....:)..pU...B..(*.6...)?.{Z..J.,.D..[....l.v..:Z!.Z0......k..'O8&iS]..S.e..4\`...x5.<.....}.x....j8..kQ6.1_p#,Q.)...1..D4..V...I...].L.y.....[...D0..Ha*.;....f.x.....u..].9.5.)J.7)......|.0...6_%.@.0..U.A.-F....b....(.LV.q..,....7.o..8...n.\..M!c..OY$...*...._..|Wq.".e..G#z....G..c.T.....j.=!...1.%.Z.)$...bR.....G..&..~....k...../../..u)...`.R.N.^F....F2..vH.._...=..9....5..%.r...Zw.c..X..^.44.q...B....r.d..&]Kk.,v....Om.....oD.q..xZ...5.....r.9}....$}9..h....3f.G%.51....m^.XF..r.%:S/t...pEAC.B'.jGm).._....wdkM.x.4&..xw..EhZ).u......a..'T.^..eR.....H|...oJ.x...j.j...=....b.w.:>K.|=(.v....|.22..;..}......k.];....h........j.e..@..B:9.?....+3..U..*....53f$....z>..(.....r...0h....j...uu'q.n*+..1....8]........([.`.P..oD..#.....7..$....Ei.&...qj.;.GVT5.vo.j.N..4....y.N..{.r......i9ob[.(...y.X.y.|.4...O~z...0.W/..6.^[.0..H.=./C'..u..q./.....}...i~...eB.X.p4....?.Q.N7h....v.B... ~..n.
                                                              Process:C:\Users\user\Desktop\Setup.exe
                                                              File Type:ASCII text, with very long lines (506), with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):15424
                                                              Entropy (8bit):5.144501845151196
                                                              Encrypted:false
                                                              SSDEEP:384:S91zn+1Y4F7sJiqqHoGuJAprLNSd2OCH8uZ3u4VRRYGI7:SLGqwqqIGwAprLNgkcuxjC7
                                                              MD5:27DFF75EF495D5336C5CD0EE636FA89A
                                                              SHA1:ED367AD10DF651DB7F322570D89E0E19DE43CE37
                                                              SHA-256:C4D6F9FF80B435063A18FE5BF657297189862662B52A4D9DA026394F2AE61A1D
                                                              SHA-512:F1957C13ED5CDB5B906279CEB7DF7EFC7589D78EE74B1D9F614B6020EDAAB9DFC957833F713CAB51249FA24C129C0D265AB2F78F025F974C9D20F4828EA19387
                                                              Malicious:false
                                                              Preview:Set Forwarding=Y..aXService-Ignore-Associates-Mysimon-Beer-Nirvana-Organ-Layers-Comprehensive-..oDTechnician-..yIEZTransmit-..CFCoDdr-Transferred-Opera-Shops-Chrysler-Genres-..uHNorman-Reasonably-Protocols-Analysts-Prev-Shall-..Set Relax=l..EUDGenealogy-Gaming-Generated-Chronicle-Mercy-Signed-Sie-Lightning-..GYdSandy-Asbestos-Subscriptions-Pk-Welding-Ata-..NWRebecca-Crystal-Positioning-Subtle-Plots-Obtain-Mainstream-..MchZip-Inspired-..hruADanish-..FVYFw-Randy-Nothing-..Set Motor=q..mOHCanvas-Second-..ScyEQualified-Starsmerchant-Pmid-..kikMBride-Node-Shore-Bw-..xjsLikes-Li-..vCZSans-Tolerance-Virtually-..KtFires-Hartford-Admitted-Options-Pass-Sk-Works-Treasure-Separately-..izpQPop-..nAjAutomation-Mv-Downloaded-Elder-Political-Occurrence-..jhIAlbums-Priorities-Internationally-Queue-Imaging-Rh-Newsletter-..Set Center=5..dPArchived-No-Suzuki-Pre-..nrjNintendo-Leslie-Easier-..AccCharge-Donna-Fuzzy-Broke-..HduGates-Journalists-Cv-Powder-Operates-..rdGBroke-Hacker-Possibility-Hypothesis-Know
                                                              Process:C:\Windows\SysWOW64\cmd.exe
                                                              File Type:ASCII text, with very long lines (506), with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):15424
                                                              Entropy (8bit):5.144501845151196
                                                              Encrypted:false
                                                              SSDEEP:384:S91zn+1Y4F7sJiqqHoGuJAprLNSd2OCH8uZ3u4VRRYGI7:SLGqwqqIGwAprLNgkcuxjC7
                                                              MD5:27DFF75EF495D5336C5CD0EE636FA89A
                                                              SHA1:ED367AD10DF651DB7F322570D89E0E19DE43CE37
                                                              SHA-256:C4D6F9FF80B435063A18FE5BF657297189862662B52A4D9DA026394F2AE61A1D
                                                              SHA-512:F1957C13ED5CDB5B906279CEB7DF7EFC7589D78EE74B1D9F614B6020EDAAB9DFC957833F713CAB51249FA24C129C0D265AB2F78F025F974C9D20F4828EA19387
                                                              Malicious:false
                                                              Preview:Set Forwarding=Y..aXService-Ignore-Associates-Mysimon-Beer-Nirvana-Organ-Layers-Comprehensive-..oDTechnician-..yIEZTransmit-..CFCoDdr-Transferred-Opera-Shops-Chrysler-Genres-..uHNorman-Reasonably-Protocols-Analysts-Prev-Shall-..Set Relax=l..EUDGenealogy-Gaming-Generated-Chronicle-Mercy-Signed-Sie-Lightning-..GYdSandy-Asbestos-Subscriptions-Pk-Welding-Ata-..NWRebecca-Crystal-Positioning-Subtle-Plots-Obtain-Mainstream-..MchZip-Inspired-..hruADanish-..FVYFw-Randy-Nothing-..Set Motor=q..mOHCanvas-Second-..ScyEQualified-Starsmerchant-Pmid-..kikMBride-Node-Shore-Bw-..xjsLikes-Li-..vCZSans-Tolerance-Virtually-..KtFires-Hartford-Admitted-Options-Pass-Sk-Works-Treasure-Separately-..izpQPop-..nAjAutomation-Mv-Downloaded-Elder-Political-Occurrence-..jhIAlbums-Priorities-Internationally-Queue-Imaging-Rh-Newsletter-..Set Center=5..dPArchived-No-Suzuki-Pre-..nrjNintendo-Leslie-Easier-..AccCharge-Donna-Fuzzy-Broke-..HduGates-Journalists-Cv-Powder-Operates-..rdGBroke-Hacker-Possibility-Hypothesis-Know
                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                              Entropy (8bit):4.279509871617026
                                                              TrID:
                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                              • DOS Executable Generic (2002/1) 0.02%
                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                              File name:Setup.exe
                                                              File size:73'410'092 bytes
                                                              MD5:35874e6f90e4b9b6db01d06ddc711f2c
                                                              SHA1:247d4310594364356cb4cc3fb1b3bb15327cdd9c
                                                              SHA256:9c9f34c8f3fd24a4197aac078985edb782bb13dcd7d830130d8a0d41fd49b9f8
                                                              SHA512:e1dae92b173ce0c0b55dc3ea3670a314b2b1df7fbc115e7a9a9fcfa379cd1dc4f8ec6658a499556327ff30b031afc97904b1a6cb996a87a17e6146c49876229a
                                                              SSDEEP:24576:aCQYhkpH/kyDjPhL6H7ocaffXMdwMHXILdGucEIbs4dB1D:2YWB//pWH0TfIwM3ILfDIbPjD
                                                              TLSH:30F702D1774D396B4ACF59AE5070766F2631D4917B26013F3A8A220DF102AA8E14E7FF
                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t...D...B...8.....
                                                              Icon Hash:0ee3c3e6dcd8c2c0
                                                              Entrypoint:0x4038af
                                                              Entrypoint Section:.text
                                                              Digitally signed:true
                                                              Imagebase:0x400000
                                                              Subsystem:windows gui
                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                              Time Stamp:0x4F47E2E4 [Fri Feb 24 19:20:04 2012 UTC]
                                                              TLS Callbacks:
                                                              CLR (.Net) Version:
                                                              OS Version Major:5
                                                              OS Version Minor:0
                                                              File Version Major:5
                                                              File Version Minor:0
                                                              Subsystem Version Major:5
                                                              Subsystem Version Minor:0
                                                              Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                              Signature Valid:false
                                                              Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                              Signature Validation Error:The digital signature of the object did not verify
                                                              Error Number:-2146869232
                                                              Not Before, Not After
                                                              • 12/01/2023 19:00:00 16/01/2026 18:59:59
                                                              Subject Chain
                                                              • CN=NVIDIA Corporation, OU=2-J, O=NVIDIA Corporation, L=Santa Clara, S=California, C=US
                                                              Version:3
                                                              Thumbprint MD5:5F1B6B6C408DB2B4D60BAA489E9A0E5A
                                                              Thumbprint SHA-1:15F760D82C79D22446CC7D4806540BF632B1E104
                                                              Thumbprint SHA-256:28AF76241322F210DA473D9569EFF6F27124C4CA9F43933DA547E8D068B0A95D
                                                              Serial:0997C56CAA59055394D9A9CDB8BEEB56
                                                              Instruction
                                                              sub esp, 000002D4h
                                                              push ebx
                                                              push ebp
                                                              push esi
                                                              push edi
                                                              push 00000020h
                                                              xor ebp, ebp
                                                              pop esi
                                                              mov dword ptr [esp+18h], ebp
                                                              mov dword ptr [esp+10h], 0040A268h
                                                              mov dword ptr [esp+14h], ebp
                                                              call dword ptr [00409030h]
                                                              push 00008001h
                                                              call dword ptr [004090B4h]
                                                              push ebp
                                                              call dword ptr [004092C0h]
                                                              push 00000008h
                                                              mov dword ptr [0047EB98h], eax
                                                              call 00007F0DE8F5BA3Bh
                                                              push ebp
                                                              push 000002B4h
                                                              mov dword ptr [0047EAB0h], eax
                                                              lea eax, dword ptr [esp+38h]
                                                              push eax
                                                              push ebp
                                                              push 0040A264h
                                                              call dword ptr [00409184h]
                                                              push 0040A24Ch
                                                              push 00476AA0h
                                                              call 00007F0DE8F5B71Dh
                                                              call dword ptr [004090B0h]
                                                              push eax
                                                              mov edi, 004CF0A0h
                                                              push edi
                                                              call 00007F0DE8F5B70Bh
                                                              push ebp
                                                              call dword ptr [00409134h]
                                                              cmp word ptr [004CF0A0h], 0022h
                                                              mov dword ptr [0047EAB8h], eax
                                                              mov eax, edi
                                                              jne 00007F0DE8F5900Ah
                                                              push 00000022h
                                                              pop esi
                                                              mov eax, 004CF0A2h
                                                              push esi
                                                              push eax
                                                              call 00007F0DE8F5B3E1h
                                                              push eax
                                                              call dword ptr [00409260h]
                                                              mov esi, eax
                                                              mov dword ptr [esp+1Ch], esi
                                                              jmp 00007F0DE8F59093h
                                                              push 00000020h
                                                              pop ebx
                                                              cmp ax, bx
                                                              jne 00007F0DE8F5900Ah
                                                              add esi, 02h
                                                              cmp word ptr [esi], bx
                                                              Programming Language:
                                                              • [ C ] VS2008 SP1 build 30729
                                                              • [IMP] VS2008 SP1 build 30729
                                                              • [ C ] VS2010 SP1 build 40219
                                                              • [RES] VS2010 SP1 build 40219
                                                              • [LNK] VS2010 SP1 build 40219
                                                              NameVirtual AddressVirtual Size Is in Section
                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xac400xb4.rdata
                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1000000x1d3f2.rsrc
                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x46000040x2628
                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x860000x994.ndata
                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_IAT0x90000x2d0.rdata
                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                              .text0x10000x728c0x7400419d4e1be1ac35a5db9c47f553b27ceaFalse0.6566540948275862data6.499708590628113IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                              .rdata0x90000x2b6e0x2c00cca1ca3fbf99570f6de9b43ce767f368False0.3678977272727273data4.497932535153822IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .data0xc0000x72b9c0x20077f0839f8ebea31040e462523e1c770eFalse0.279296875data1.8049406284608531IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .ndata0x7f0000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                              .rsrc0x1000000x1d3f20x1d400765705fc89038e833a240dca25bdcb60False0.9517978766025641data7.797528593261486IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                              .reloc0x11e0000xfd60x10008246f25992ed6900a1eda8f7e5cbfcfbFalse0.598388671875data5.596110919440043IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                              RT_ICON0x1002200x178c6PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9904410392518713
                                                              RT_ICON0x117ae80x28a6PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0010570824524312
                                                              RT_ICON0x11a3900x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.6155410903173312
                                                              RT_ICON0x11c9f80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7774822695035462
                                                              RT_DIALOG0x11ce600x100dataEnglishUnited States0.5234375
                                                              RT_DIALOG0x11cf600x11cdataEnglishUnited States0.6056338028169014
                                                              RT_DIALOG0x11d07c0x60dataEnglishUnited States0.7291666666666666
                                                              RT_GROUP_ICON0x11d0dc0x3eTarga image data - Map 32 x 30918 x 1 +1EnglishUnited States0.8225806451612904
                                                              RT_MANIFEST0x11d11c0x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                              DLLImport
                                                              KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                              USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                              GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                              SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                              ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                              COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                              ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                              VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                              Language of compilation systemCountry where language is spokenMap
                                                              EnglishUnited States
                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                              2024-12-08T01:38:54.544319+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449820104.21.24.90443TCP
                                                              2024-12-08T01:38:56.501008+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449820104.21.24.90443TCP
                                                              2024-12-08T01:38:56.501008+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449820104.21.24.90443TCP
                                                              2024-12-08T01:38:56.908064+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449826104.21.24.90443TCP
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Dec 8, 2024 01:38:53.324717999 CET49820443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:53.324748039 CET44349820104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:53.324824095 CET49820443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:53.327904940 CET49820443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:53.327915907 CET44349820104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:54.544225931 CET44349820104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:54.544318914 CET49820443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:54.546111107 CET49820443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:54.546123028 CET44349820104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:54.546350956 CET44349820104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:54.594621897 CET49820443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:54.594639063 CET49820443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:54.594748020 CET44349820104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:56.501013994 CET44349820104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:56.501096964 CET44349820104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:56.501173019 CET49820443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:56.502964020 CET49820443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:56.502979994 CET44349820104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:56.502990007 CET49820443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:56.502996922 CET44349820104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:56.543698072 CET49826443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:56.543730021 CET44349826104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:56.543817043 CET49826443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:56.544091940 CET49826443192.168.2.4104.21.24.90
                                                              Dec 8, 2024 01:38:56.544102907 CET44349826104.21.24.90192.168.2.4
                                                              Dec 8, 2024 01:38:56.908063889 CET49826443192.168.2.4104.21.24.90
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Dec 8, 2024 01:37:19.346024036 CET6295353192.168.2.41.1.1.1
                                                              Dec 8, 2024 01:37:19.579225063 CET53629531.1.1.1192.168.2.4
                                                              Dec 8, 2024 01:38:52.940166950 CET6481953192.168.2.41.1.1.1
                                                              Dec 8, 2024 01:38:53.318696976 CET53648191.1.1.1192.168.2.4
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Dec 8, 2024 01:37:19.346024036 CET192.168.2.41.1.1.10x57b3Standard query (0)tLlYhvSbrTRqhxpzIwTuQjRbuHJm.tLlYhvSbrTRqhxpzIwTuQjRbuHJmA (IP address)IN (0x0001)false
                                                              Dec 8, 2024 01:38:52.940166950 CET192.168.2.41.1.1.10x4af9Standard query (0)lumzulyj.shopA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Dec 8, 2024 01:37:19.579225063 CET1.1.1.1192.168.2.40x57b3Name error (3)tLlYhvSbrTRqhxpzIwTuQjRbuHJm.tLlYhvSbrTRqhxpzIwTuQjRbuHJmnonenoneA (IP address)IN (0x0001)false
                                                              Dec 8, 2024 01:38:53.318696976 CET1.1.1.1192.168.2.40x4af9No error (0)lumzulyj.shop104.21.24.90A (IP address)IN (0x0001)false
                                                              Dec 8, 2024 01:38:53.318696976 CET1.1.1.1192.168.2.40x4af9No error (0)lumzulyj.shop172.67.218.26A (IP address)IN (0x0001)false
                                                              • lumzulyj.shop
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.449820104.21.24.904433452C:\Users\user\AppData\Local\Temp\485687\Introduces.com
                                                              TimestampBytes transferredDirectionData
                                                              2024-12-08 00:38:54 UTC260OUTPOST /api HTTP/1.1
                                                              Connection: Keep-Alive
                                                              Content-Type: application/x-www-form-urlencoded
                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                              Content-Length: 8
                                                              Host: lumzulyj.shop
                                                              2024-12-08 00:38:54 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                              Data Ascii: act=life
                                                              2024-12-08 00:38:56 UTC1004INHTTP/1.1 200 OK
                                                              Date: Sun, 08 Dec 2024 00:38:56 GMT
                                                              Content-Type: text/html; charset=UTF-8
                                                              Transfer-Encoding: chunked
                                                              Connection: close
                                                              Set-Cookie: PHPSESSID=n8qlsii0ii9lap00omf4pke114; expires=Wed, 02-Apr-2025 18:25:34 GMT; Max-Age=9999999; path=/
                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                              Pragma: no-cache
                                                              CF-Cache-Status: DYNAMIC
                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IDHhSys20y99lIrIJU4WqsllXRTjbjTrysKU46MTlTGhDdQaBijtlnh%2B%2B1mJgcBK1SwX2xHcuyfVrUUAjUYElXEvw9enduntvdIryBtYyZviY7QjeCpOs080kBhD84b9"}],"group":"cf-nel","max_age":604800}
                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                              Server: cloudflare
                                                              CF-RAY: 8ee8b2009bd242dd-EWR
                                                              alt-svc: h3=":443"; ma=86400
                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1591&min_rtt=1587&rtt_var=604&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2832&recv_bytes=904&delivery_rate=1800246&cwnd=186&unsent_bytes=0&cid=60b7a7371b5a7938&ts=1968&x=0"
                                                              2024-12-08 00:38:56 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                              Data Ascii: 2ok
                                                              2024-12-08 00:38:56 UTC5INData Raw: 30 0d 0a 0d 0a
                                                              Data Ascii: 0


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:19:37:14
                                                              Start date:07/12/2024
                                                              Path:C:\Users\user\Desktop\Setup.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Users\user\Desktop\Setup.exe"
                                                              Imagebase:0x400000
                                                              File size:73'410'092 bytes
                                                              MD5 hash:35874E6F90E4B9B6DB01D06DDC711F2C
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:low
                                                              Has exited:true

                                                              Target ID:1
                                                              Start time:19:37:15
                                                              Start date:07/12/2024
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\cmd.exe" /c copy Were Were.cmd && Were.cmd
                                                              Imagebase:0x240000
                                                              File size:236'544 bytes
                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:2
                                                              Start time:19:37:15
                                                              Start date:07/12/2024
                                                              Path:C:\Windows\System32\conhost.exe
                                                              Wow64 process (32bit):false
                                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                              Imagebase:0x7ff7699e0000
                                                              File size:862'208 bytes
                                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:3
                                                              Start time:19:37:16
                                                              Start date:07/12/2024
                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:tasklist
                                                              Imagebase:0x990000
                                                              File size:79'360 bytes
                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:4
                                                              Start time:19:37:16
                                                              Start date:07/12/2024
                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:findstr /I "wrsa opssvc"
                                                              Imagebase:0xa80000
                                                              File size:29'696 bytes
                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:5
                                                              Start time:19:37:16
                                                              Start date:07/12/2024
                                                              Path:C:\Windows\SysWOW64\tasklist.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:tasklist
                                                              Imagebase:0x990000
                                                              File size:79'360 bytes
                                                              MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:6
                                                              Start time:19:37:16
                                                              Start date:07/12/2024
                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                              Imagebase:0xa80000
                                                              File size:29'696 bytes
                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:7
                                                              Start time:19:37:17
                                                              Start date:07/12/2024
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:cmd /c md 485687
                                                              Imagebase:0x240000
                                                              File size:236'544 bytes
                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:8
                                                              Start time:19:37:17
                                                              Start date:07/12/2024
                                                              Path:C:\Windows\SysWOW64\findstr.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:findstr /V "ADDITIONALLYPURCHASEDNEWLYLAUNDRYASSISTSHELPLESWRIGHT" Permitted
                                                              Imagebase:0xa80000
                                                              File size:29'696 bytes
                                                              MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:9
                                                              Start time:19:37:17
                                                              Start date:07/12/2024
                                                              Path:C:\Windows\SysWOW64\cmd.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:cmd /c copy /b ..\College + ..\Shelter + ..\Defects + ..\Populations + ..\Alive + ..\Bus k
                                                              Imagebase:0x240000
                                                              File size:236'544 bytes
                                                              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:10
                                                              Start time:19:37:17
                                                              Start date:07/12/2024
                                                              Path:C:\Users\user\AppData\Local\Temp\485687\Introduces.com
                                                              Wow64 process (32bit):true
                                                              Commandline:Introduces.com k
                                                              Imagebase:0x9f0000
                                                              File size:893'608 bytes
                                                              MD5 hash:6EE7DDEBFF0A2B78C7AC30F6E00D1D11
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Antivirus matches:
                                                              • Detection: 3%, ReversingLabs
                                                              Reputation:moderate
                                                              Has exited:true

                                                              Target ID:11
                                                              Start time:19:37:17
                                                              Start date:07/12/2024
                                                              Path:C:\Windows\SysWOW64\choice.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:choice /d y /t 5
                                                              Imagebase:0xcf0000
                                                              File size:28'160 bytes
                                                              MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Has exited:true

                                                              Reset < >

                                                                Execution Graph

                                                                Execution Coverage:17.7%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:21%
                                                                Total number of Nodes:1482
                                                                Total number of Limit Nodes:28
                                                                execution_graph 4201 402fc0 4202 401446 18 API calls 4201->4202 4203 402fc7 4202->4203 4204 401a13 4203->4204 4205 403017 4203->4205 4206 40300a 4203->4206 4208 406831 18 API calls 4205->4208 4207 401446 18 API calls 4206->4207 4207->4204 4208->4204 4209 4023c1 4210 40145c 18 API calls 4209->4210 4211 4023c8 4210->4211 4214 407296 4211->4214 4217 406efe CreateFileW 4214->4217 4218 406f30 4217->4218 4219 406f4a ReadFile 4217->4219 4220 4062cf 11 API calls 4218->4220 4221 4023d6 4219->4221 4224 406fb0 4219->4224 4220->4221 4222 406fc7 ReadFile lstrcpynA lstrcmpA 4222->4224 4225 40700e SetFilePointer ReadFile 4222->4225 4223 40720f CloseHandle 4223->4221 4224->4221 4224->4222 4224->4223 4226 407009 4224->4226 4225->4223 4227 4070d4 ReadFile 4225->4227 4226->4223 4228 407164 4227->4228 4228->4226 4228->4227 4229 40718b SetFilePointer GlobalAlloc ReadFile 4228->4229 4230 4071eb lstrcpynW GlobalFree 4229->4230 4231 4071cf 4229->4231 4230->4223 4231->4230 4231->4231 4232 401cc3 4233 40145c 18 API calls 4232->4233 4234 401cca lstrlenW 4233->4234 4235 4030dc 4234->4235 4236 4030e3 4235->4236 4238 405f7d wsprintfW 4235->4238 4238->4236 4239 401c46 4240 40145c 18 API calls 4239->4240 4241 401c4c 4240->4241 4242 4062cf 11 API calls 4241->4242 4243 401c59 4242->4243 4244 406cc7 81 API calls 4243->4244 4245 401c64 4244->4245 4246 403049 4247 401446 18 API calls 4246->4247 4248 403050 4247->4248 4249 406831 18 API calls 4248->4249 4250 401a13 4248->4250 4249->4250 4251 40204a 4252 401446 18 API calls 4251->4252 4253 402051 IsWindow 4252->4253 4254 4018d3 4253->4254 4255 40324c 4256 403277 4255->4256 4257 40325e SetTimer 4255->4257 4258 4032cc 4256->4258 4259 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4256->4259 4257->4256 4259->4258 4260 4022cc 4261 40145c 18 API calls 4260->4261 4262 4022d3 4261->4262 4263 406301 2 API calls 4262->4263 4264 4022d9 4263->4264 4266 4022e8 4264->4266 4269 405f7d wsprintfW 4264->4269 4267 4030e3 4266->4267 4270 405f7d wsprintfW 4266->4270 4269->4266 4270->4267 4271 4030cf 4272 40145c 18 API calls 4271->4272 4273 4030d6 4272->4273 4275 4030dc 4273->4275 4278 4063d8 GlobalAlloc lstrlenW 4273->4278 4276 4030e3 4275->4276 4305 405f7d wsprintfW 4275->4305 4279 406460 4278->4279 4280 40640e 4278->4280 4279->4275 4281 40643b GetVersionExW 4280->4281 4306 406057 CharUpperW 4280->4306 4281->4279 4282 40646a 4281->4282 4283 406490 LoadLibraryA 4282->4283 4284 406479 4282->4284 4283->4279 4287 4064ae GetProcAddress GetProcAddress GetProcAddress 4283->4287 4284->4279 4286 4065b1 GlobalFree 4284->4286 4288 4065c7 LoadLibraryA 4286->4288 4289 406709 FreeLibrary 4286->4289 4290 406621 4287->4290 4294 4064d6 4287->4294 4288->4279 4292 4065e1 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4288->4292 4289->4279 4291 40667d FreeLibrary 4290->4291 4293 406656 4290->4293 4291->4293 4292->4290 4297 406716 4293->4297 4302 4066b1 lstrcmpW 4293->4302 4303 4066e2 CloseHandle 4293->4303 4304 406700 CloseHandle 4293->4304 4294->4290 4295 406516 4294->4295 4296 4064fa FreeLibrary GlobalFree 4294->4296 4295->4286 4298 406528 lstrcpyW OpenProcess 4295->4298 4300 40657b CloseHandle CharUpperW lstrcmpW 4295->4300 4296->4279 4299 40671b CloseHandle FreeLibrary 4297->4299 4298->4295 4298->4300 4301 406730 CloseHandle 4299->4301 4300->4290 4300->4295 4301->4299 4302->4293 4302->4301 4303->4293 4304->4289 4305->4276 4306->4280 4307 4044d1 4308 40450b 4307->4308 4309 40453e 4307->4309 4375 405cb0 GetDlgItemTextW 4308->4375 4310 40454b GetDlgItem GetAsyncKeyState 4309->4310 4314 4045dd 4309->4314 4312 40456a GetDlgItem 4310->4312 4325 404588 4310->4325 4317 403d6b 19 API calls 4312->4317 4313 4046c9 4373 40485f 4313->4373 4377 405cb0 GetDlgItemTextW 4313->4377 4314->4313 4322 406831 18 API calls 4314->4322 4314->4373 4315 404516 4316 406064 5 API calls 4315->4316 4318 40451c 4316->4318 4320 40457d ShowWindow 4317->4320 4321 403ea0 5 API calls 4318->4321 4320->4325 4326 404521 GetDlgItem 4321->4326 4327 40465b SHBrowseForFolderW 4322->4327 4323 4046f5 4328 4067aa 18 API calls 4323->4328 4324 403df6 8 API calls 4329 404873 4324->4329 4330 4045a5 SetWindowTextW 4325->4330 4334 405d85 4 API calls 4325->4334 4331 40452f IsDlgButtonChecked 4326->4331 4326->4373 4327->4313 4333 404673 CoTaskMemFree 4327->4333 4338 4046fb 4328->4338 4332 403d6b 19 API calls 4330->4332 4331->4309 4336 4045c3 4332->4336 4337 40674e 3 API calls 4333->4337 4335 40459b 4334->4335 4335->4330 4342 40674e 3 API calls 4335->4342 4339 403d6b 19 API calls 4336->4339 4340 404680 4337->4340 4378 406035 lstrcpynW 4338->4378 4343 4045ce 4339->4343 4344 4046b7 SetDlgItemTextW 4340->4344 4349 406831 18 API calls 4340->4349 4342->4330 4376 403dc4 SendMessageW 4343->4376 4344->4313 4345 404712 4347 406328 3 API calls 4345->4347 4356 40471a 4347->4356 4348 4045d6 4350 406328 3 API calls 4348->4350 4351 40469f lstrcmpiW 4349->4351 4350->4314 4351->4344 4354 4046b0 lstrcatW 4351->4354 4352 40475c 4379 406035 lstrcpynW 4352->4379 4354->4344 4355 404765 4357 405d85 4 API calls 4355->4357 4356->4352 4360 40677d 2 API calls 4356->4360 4362 4047b1 4356->4362 4358 40476b GetDiskFreeSpaceW 4357->4358 4361 40478f MulDiv 4358->4361 4358->4362 4360->4356 4361->4362 4363 40480e 4362->4363 4380 4043d9 4362->4380 4364 404831 4363->4364 4366 40141d 80 API calls 4363->4366 4388 403db1 KiUserCallbackDispatcher 4364->4388 4366->4364 4367 4047ff 4369 404810 SetDlgItemTextW 4367->4369 4370 404804 4367->4370 4369->4363 4372 4043d9 21 API calls 4370->4372 4371 40484d 4371->4373 4389 403d8d 4371->4389 4372->4363 4373->4324 4375->4315 4376->4348 4377->4323 4378->4345 4379->4355 4381 4043f9 4380->4381 4382 406831 18 API calls 4381->4382 4383 404439 4382->4383 4384 406831 18 API calls 4383->4384 4385 404444 4384->4385 4386 406831 18 API calls 4385->4386 4387 404454 lstrlenW wsprintfW SetDlgItemTextW 4386->4387 4387->4367 4388->4371 4390 403da0 SendMessageW 4389->4390 4391 403d9b 4389->4391 4390->4373 4391->4390 4392 401dd3 4393 401446 18 API calls 4392->4393 4394 401dda 4393->4394 4395 401446 18 API calls 4394->4395 4396 4018d3 4395->4396 4397 402e55 4398 40145c 18 API calls 4397->4398 4399 402e63 4398->4399 4400 402e79 4399->4400 4401 40145c 18 API calls 4399->4401 4402 405e5c 2 API calls 4400->4402 4401->4400 4403 402e7f 4402->4403 4427 405e7c GetFileAttributesW CreateFileW 4403->4427 4405 402e8c 4406 402f35 4405->4406 4407 402e98 GlobalAlloc 4405->4407 4410 4062cf 11 API calls 4406->4410 4408 402eb1 4407->4408 4409 402f2c CloseHandle 4407->4409 4428 403368 SetFilePointer 4408->4428 4409->4406 4412 402f45 4410->4412 4414 402f50 DeleteFileW 4412->4414 4415 402f63 4412->4415 4413 402eb7 4416 403336 ReadFile 4413->4416 4414->4415 4429 401435 4415->4429 4418 402ec0 GlobalAlloc 4416->4418 4419 402ed0 4418->4419 4420 402f04 WriteFile GlobalFree 4418->4420 4422 40337f 33 API calls 4419->4422 4421 40337f 33 API calls 4420->4421 4423 402f29 4421->4423 4426 402edd 4422->4426 4423->4409 4425 402efb GlobalFree 4425->4420 4426->4425 4427->4405 4428->4413 4430 404f9e 25 API calls 4429->4430 4431 401443 4430->4431 4432 401cd5 4433 401446 18 API calls 4432->4433 4434 401cdd 4433->4434 4435 401446 18 API calls 4434->4435 4436 401ce8 4435->4436 4437 40145c 18 API calls 4436->4437 4438 401cf1 4437->4438 4439 401d07 lstrlenW 4438->4439 4440 401d43 4438->4440 4441 401d11 4439->4441 4441->4440 4445 406035 lstrcpynW 4441->4445 4443 401d2c 4443->4440 4444 401d39 lstrlenW 4443->4444 4444->4440 4445->4443 4446 402cd7 4447 401446 18 API calls 4446->4447 4449 402c64 4447->4449 4448 402d17 ReadFile 4448->4449 4449->4446 4449->4448 4450 402d99 4449->4450 4451 402dd8 4452 4030e3 4451->4452 4453 402ddf 4451->4453 4454 402de5 FindClose 4453->4454 4454->4452 4455 401d5c 4456 40145c 18 API calls 4455->4456 4457 401d63 4456->4457 4458 40145c 18 API calls 4457->4458 4459 401d6c 4458->4459 4460 401d73 lstrcmpiW 4459->4460 4461 401d86 lstrcmpW 4459->4461 4462 401d79 4460->4462 4461->4462 4463 401c99 4461->4463 4462->4461 4462->4463 4464 4027e3 4465 4027e9 4464->4465 4466 4027f2 4465->4466 4467 402836 4465->4467 4480 401553 4466->4480 4468 40145c 18 API calls 4467->4468 4470 40283d 4468->4470 4472 4062cf 11 API calls 4470->4472 4471 4027f9 4473 40145c 18 API calls 4471->4473 4477 401a13 4471->4477 4474 40284d 4472->4474 4475 40280a RegDeleteValueW 4473->4475 4484 40149d RegOpenKeyExW 4474->4484 4476 4062cf 11 API calls 4475->4476 4479 40282a RegCloseKey 4476->4479 4479->4477 4481 401563 4480->4481 4482 40145c 18 API calls 4481->4482 4483 401589 RegOpenKeyExW 4482->4483 4483->4471 4487 4014c9 4484->4487 4492 401515 4484->4492 4485 4014ef RegEnumKeyW 4486 401501 RegCloseKey 4485->4486 4485->4487 4489 406328 3 API calls 4486->4489 4487->4485 4487->4486 4488 401526 RegCloseKey 4487->4488 4490 40149d 3 API calls 4487->4490 4488->4492 4491 401511 4489->4491 4490->4487 4491->4492 4493 401541 RegDeleteKeyW 4491->4493 4492->4477 4493->4492 4494 4040e4 4495 4040ff 4494->4495 4501 40422d 4494->4501 4497 40413a 4495->4497 4525 403ff6 WideCharToMultiByte 4495->4525 4496 404298 4498 40436a 4496->4498 4499 4042a2 GetDlgItem 4496->4499 4505 403d6b 19 API calls 4497->4505 4506 403df6 8 API calls 4498->4506 4502 40432b 4499->4502 4503 4042bc 4499->4503 4501->4496 4501->4498 4504 404267 GetDlgItem SendMessageW 4501->4504 4502->4498 4507 40433d 4502->4507 4503->4502 4511 4042e2 6 API calls 4503->4511 4530 403db1 KiUserCallbackDispatcher 4504->4530 4509 40417a 4505->4509 4510 404365 4506->4510 4512 404353 4507->4512 4513 404343 SendMessageW 4507->4513 4515 403d6b 19 API calls 4509->4515 4511->4502 4512->4510 4516 404359 SendMessageW 4512->4516 4513->4512 4514 404293 4517 403d8d SendMessageW 4514->4517 4518 404187 CheckDlgButton 4515->4518 4516->4510 4517->4496 4528 403db1 KiUserCallbackDispatcher 4518->4528 4520 4041a5 GetDlgItem 4529 403dc4 SendMessageW 4520->4529 4522 4041bb SendMessageW 4523 4041e1 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4522->4523 4524 4041d8 GetSysColor 4522->4524 4523->4510 4524->4523 4526 404033 4525->4526 4527 404015 GlobalAlloc WideCharToMultiByte 4525->4527 4526->4497 4527->4526 4528->4520 4529->4522 4530->4514 4531 402ae4 4532 402aeb 4531->4532 4533 4030e3 4531->4533 4534 402af2 CloseHandle 4532->4534 4534->4533 4535 402065 4536 401446 18 API calls 4535->4536 4537 40206d 4536->4537 4538 401446 18 API calls 4537->4538 4539 402076 GetDlgItem 4538->4539 4540 4030dc 4539->4540 4541 4030e3 4540->4541 4543 405f7d wsprintfW 4540->4543 4543->4541 4544 402665 4545 40145c 18 API calls 4544->4545 4546 40266b 4545->4546 4547 40145c 18 API calls 4546->4547 4548 402674 4547->4548 4549 40145c 18 API calls 4548->4549 4550 40267d 4549->4550 4551 4062cf 11 API calls 4550->4551 4552 40268c 4551->4552 4553 406301 2 API calls 4552->4553 4554 402695 4553->4554 4555 4026a6 lstrlenW lstrlenW 4554->4555 4557 404f9e 25 API calls 4554->4557 4559 4030e3 4554->4559 4556 404f9e 25 API calls 4555->4556 4558 4026e8 SHFileOperationW 4556->4558 4557->4554 4558->4554 4558->4559 4560 401c69 4561 40145c 18 API calls 4560->4561 4562 401c70 4561->4562 4563 4062cf 11 API calls 4562->4563 4564 401c80 4563->4564 4565 405ccc MessageBoxIndirectW 4564->4565 4566 401a13 4565->4566 4567 402f6e 4568 402f72 4567->4568 4569 402fae 4567->4569 4571 4062cf 11 API calls 4568->4571 4570 40145c 18 API calls 4569->4570 4577 402f9d 4570->4577 4572 402f7d 4571->4572 4573 4062cf 11 API calls 4572->4573 4574 402f90 4573->4574 4575 402fa2 4574->4575 4576 402f98 4574->4576 4579 406113 9 API calls 4575->4579 4578 403ea0 5 API calls 4576->4578 4578->4577 4579->4577 4580 4023f0 4581 402403 4580->4581 4582 4024da 4580->4582 4583 40145c 18 API calls 4581->4583 4584 404f9e 25 API calls 4582->4584 4585 40240a 4583->4585 4588 4024f1 4584->4588 4586 40145c 18 API calls 4585->4586 4587 402413 4586->4587 4589 402429 LoadLibraryExW 4587->4589 4590 40241b GetModuleHandleW 4587->4590 4591 4024ce 4589->4591 4592 40243e 4589->4592 4590->4589 4590->4592 4594 404f9e 25 API calls 4591->4594 4604 406391 GlobalAlloc WideCharToMultiByte 4592->4604 4594->4582 4595 402449 4596 40248c 4595->4596 4597 40244f 4595->4597 4598 404f9e 25 API calls 4596->4598 4599 401435 25 API calls 4597->4599 4602 40245f 4597->4602 4600 402496 4598->4600 4599->4602 4601 4062cf 11 API calls 4600->4601 4601->4602 4602->4588 4603 4024c0 FreeLibrary 4602->4603 4603->4588 4605 4063c9 GlobalFree 4604->4605 4606 4063bc GetProcAddress 4604->4606 4605->4595 4606->4605 3417 402175 3427 401446 3417->3427 3419 40217c 3420 401446 18 API calls 3419->3420 3421 402186 3420->3421 3422 402197 3421->3422 3425 4062cf 11 API calls 3421->3425 3423 4021aa EnableWindow 3422->3423 3424 40219f ShowWindow 3422->3424 3426 4030e3 3423->3426 3424->3426 3425->3422 3428 406831 18 API calls 3427->3428 3429 401455 3428->3429 3429->3419 4607 4048f8 4608 404906 4607->4608 4609 40491d 4607->4609 4610 40490c 4608->4610 4625 404986 4608->4625 4611 40492b IsWindowVisible 4609->4611 4617 404942 4609->4617 4612 403ddb SendMessageW 4610->4612 4614 404938 4611->4614 4611->4625 4615 404916 4612->4615 4613 40498c CallWindowProcW 4613->4615 4626 40487a SendMessageW 4614->4626 4617->4613 4631 406035 lstrcpynW 4617->4631 4619 404971 4632 405f7d wsprintfW 4619->4632 4621 404978 4622 40141d 80 API calls 4621->4622 4623 40497f 4622->4623 4633 406035 lstrcpynW 4623->4633 4625->4613 4627 4048d7 SendMessageW 4626->4627 4628 40489d GetMessagePos ScreenToClient SendMessageW 4626->4628 4630 4048cf 4627->4630 4629 4048d4 4628->4629 4628->4630 4629->4627 4630->4617 4631->4619 4632->4621 4633->4625 3722 4050f9 3723 4052c1 3722->3723 3724 40511a GetDlgItem GetDlgItem GetDlgItem 3722->3724 3725 4052f2 3723->3725 3726 4052ca GetDlgItem CreateThread CloseHandle 3723->3726 3771 403dc4 SendMessageW 3724->3771 3728 405320 3725->3728 3730 405342 3725->3730 3731 40530c ShowWindow ShowWindow 3725->3731 3726->3725 3774 405073 OleInitialize 3726->3774 3732 40537e 3728->3732 3734 405331 3728->3734 3735 405357 ShowWindow 3728->3735 3729 40518e 3741 406831 18 API calls 3729->3741 3736 403df6 8 API calls 3730->3736 3773 403dc4 SendMessageW 3731->3773 3732->3730 3737 405389 SendMessageW 3732->3737 3738 403d44 SendMessageW 3734->3738 3739 405377 3735->3739 3740 405369 3735->3740 3746 4052ba 3736->3746 3745 4053a2 CreatePopupMenu 3737->3745 3737->3746 3738->3730 3744 403d44 SendMessageW 3739->3744 3742 404f9e 25 API calls 3740->3742 3743 4051ad 3741->3743 3742->3739 3747 4062cf 11 API calls 3743->3747 3744->3732 3748 406831 18 API calls 3745->3748 3749 4051b8 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3747->3749 3750 4053b2 AppendMenuW 3748->3750 3751 405203 SendMessageW SendMessageW 3749->3751 3752 40521f 3749->3752 3753 4053c5 GetWindowRect 3750->3753 3754 4053d8 3750->3754 3751->3752 3755 405232 3752->3755 3756 405224 SendMessageW 3752->3756 3757 4053df TrackPopupMenu 3753->3757 3754->3757 3758 403d6b 19 API calls 3755->3758 3756->3755 3757->3746 3759 4053fd 3757->3759 3760 405242 3758->3760 3761 405419 SendMessageW 3759->3761 3762 40524b ShowWindow 3760->3762 3763 40527f GetDlgItem SendMessageW 3760->3763 3761->3761 3764 405436 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3761->3764 3765 405261 ShowWindow 3762->3765 3766 40526e 3762->3766 3763->3746 3767 4052a2 SendMessageW SendMessageW 3763->3767 3768 40545b SendMessageW 3764->3768 3765->3766 3772 403dc4 SendMessageW 3766->3772 3767->3746 3768->3768 3769 405486 GlobalUnlock SetClipboardData CloseClipboard 3768->3769 3769->3746 3771->3729 3772->3763 3773->3728 3775 403ddb SendMessageW 3774->3775 3779 405096 3775->3779 3776 403ddb SendMessageW 3777 4050d1 OleUninitialize 3776->3777 3778 4062cf 11 API calls 3778->3779 3779->3778 3780 40139d 80 API calls 3779->3780 3781 4050c1 3779->3781 3780->3779 3781->3776 4634 4020f9 GetDC GetDeviceCaps 4635 401446 18 API calls 4634->4635 4636 402116 MulDiv 4635->4636 4637 401446 18 API calls 4636->4637 4638 40212c 4637->4638 4639 406831 18 API calls 4638->4639 4640 402165 CreateFontIndirectW 4639->4640 4641 4030dc 4640->4641 4642 4030e3 4641->4642 4644 405f7d wsprintfW 4641->4644 4644->4642 4645 4024fb 4646 40145c 18 API calls 4645->4646 4647 402502 4646->4647 4648 40145c 18 API calls 4647->4648 4649 40250c 4648->4649 4650 40145c 18 API calls 4649->4650 4651 402515 4650->4651 4652 40145c 18 API calls 4651->4652 4653 40251f 4652->4653 4654 40145c 18 API calls 4653->4654 4655 402529 4654->4655 4656 40253d 4655->4656 4657 40145c 18 API calls 4655->4657 4658 4062cf 11 API calls 4656->4658 4657->4656 4659 40256a CoCreateInstance 4658->4659 4660 40258c 4659->4660 4661 4026fc 4663 402708 4661->4663 4664 401ee4 4661->4664 4662 406831 18 API calls 4662->4664 4664->4661 4664->4662 3808 4019fd 3809 40145c 18 API calls 3808->3809 3810 401a04 3809->3810 3813 405eab 3810->3813 3814 405eb8 GetTickCount GetTempFileNameW 3813->3814 3815 401a0b 3814->3815 3816 405eee 3814->3816 3816->3814 3816->3815 4665 4022fd 4666 40145c 18 API calls 4665->4666 4667 402304 GetFileVersionInfoSizeW 4666->4667 4668 4030e3 4667->4668 4669 40232b GlobalAlloc 4667->4669 4669->4668 4670 40233f GetFileVersionInfoW 4669->4670 4671 402350 VerQueryValueW 4670->4671 4672 402381 GlobalFree 4670->4672 4671->4672 4673 402369 4671->4673 4672->4668 4678 405f7d wsprintfW 4673->4678 4676 402375 4679 405f7d wsprintfW 4676->4679 4678->4676 4679->4672 4680 402afd 4681 40145c 18 API calls 4680->4681 4682 402b04 4681->4682 4687 405e7c GetFileAttributesW CreateFileW 4682->4687 4684 402b10 4685 4030e3 4684->4685 4688 405f7d wsprintfW 4684->4688 4687->4684 4688->4685 4689 4029ff 4690 401553 19 API calls 4689->4690 4691 402a09 4690->4691 4692 40145c 18 API calls 4691->4692 4693 402a12 4692->4693 4694 402a1f RegQueryValueExW 4693->4694 4698 401a13 4693->4698 4695 402a45 4694->4695 4696 402a3f 4694->4696 4697 4029e4 RegCloseKey 4695->4697 4695->4698 4696->4695 4700 405f7d wsprintfW 4696->4700 4697->4698 4700->4695 4701 401000 4702 401037 BeginPaint GetClientRect 4701->4702 4703 40100c DefWindowProcW 4701->4703 4705 4010fc 4702->4705 4706 401182 4703->4706 4707 401073 CreateBrushIndirect FillRect DeleteObject 4705->4707 4708 401105 4705->4708 4707->4705 4709 401170 EndPaint 4708->4709 4710 40110b CreateFontIndirectW 4708->4710 4709->4706 4710->4709 4711 40111b 6 API calls 4710->4711 4711->4709 4712 401f80 4713 401446 18 API calls 4712->4713 4714 401f88 4713->4714 4715 401446 18 API calls 4714->4715 4716 401f93 4715->4716 4717 401fa3 4716->4717 4718 40145c 18 API calls 4716->4718 4719 401fb3 4717->4719 4720 40145c 18 API calls 4717->4720 4718->4717 4721 402006 4719->4721 4722 401fbc 4719->4722 4720->4719 4723 40145c 18 API calls 4721->4723 4724 401446 18 API calls 4722->4724 4725 40200d 4723->4725 4726 401fc4 4724->4726 4728 40145c 18 API calls 4725->4728 4727 401446 18 API calls 4726->4727 4729 401fce 4727->4729 4730 402016 FindWindowExW 4728->4730 4731 401ff6 SendMessageW 4729->4731 4732 401fd8 SendMessageTimeoutW 4729->4732 4734 402036 4730->4734 4731->4734 4732->4734 4733 4030e3 4734->4733 4736 405f7d wsprintfW 4734->4736 4736->4733 4737 402880 4738 402884 4737->4738 4739 40145c 18 API calls 4738->4739 4740 4028a7 4739->4740 4741 40145c 18 API calls 4740->4741 4742 4028b1 4741->4742 4743 4028ba RegCreateKeyExW 4742->4743 4744 4028e8 4743->4744 4749 4029ef 4743->4749 4745 402934 4744->4745 4747 40145c 18 API calls 4744->4747 4746 402963 4745->4746 4748 401446 18 API calls 4745->4748 4750 4029ae RegSetValueExW 4746->4750 4753 40337f 33 API calls 4746->4753 4751 4028fc lstrlenW 4747->4751 4752 402947 4748->4752 4756 4029c6 RegCloseKey 4750->4756 4757 4029cb 4750->4757 4754 402918 4751->4754 4755 40292a 4751->4755 4759 4062cf 11 API calls 4752->4759 4760 40297b 4753->4760 4761 4062cf 11 API calls 4754->4761 4762 4062cf 11 API calls 4755->4762 4756->4749 4758 4062cf 11 API calls 4757->4758 4758->4756 4759->4746 4768 406250 4760->4768 4765 402922 4761->4765 4762->4745 4765->4750 4767 4062cf 11 API calls 4767->4765 4769 406273 4768->4769 4770 4062b6 4769->4770 4771 406288 wsprintfW 4769->4771 4772 402991 4770->4772 4773 4062bf lstrcatW 4770->4773 4771->4770 4771->4771 4772->4767 4773->4772 4774 403d02 4775 403d0d 4774->4775 4776 403d11 4775->4776 4777 403d14 GlobalAlloc 4775->4777 4777->4776 4778 402082 4779 401446 18 API calls 4778->4779 4780 402093 SetWindowLongW 4779->4780 4781 4030e3 4780->4781 4782 402a84 4783 401553 19 API calls 4782->4783 4784 402a8e 4783->4784 4785 401446 18 API calls 4784->4785 4786 402a98 4785->4786 4787 401a13 4786->4787 4788 402ab2 RegEnumKeyW 4786->4788 4789 402abe RegEnumValueW 4786->4789 4790 402a7e 4788->4790 4789->4787 4789->4790 4790->4787 4791 4029e4 RegCloseKey 4790->4791 4791->4787 4792 402c8a 4793 402ca2 4792->4793 4794 402c8f 4792->4794 4796 40145c 18 API calls 4793->4796 4795 401446 18 API calls 4794->4795 4798 402c97 4795->4798 4797 402ca9 lstrlenW 4796->4797 4797->4798 4799 401a13 4798->4799 4800 402ccb WriteFile 4798->4800 4800->4799 4801 401d8e 4802 40145c 18 API calls 4801->4802 4803 401d95 ExpandEnvironmentStringsW 4802->4803 4804 401da8 4803->4804 4805 401db9 4803->4805 4804->4805 4806 401dad lstrcmpW 4804->4806 4806->4805 4807 401e0f 4808 401446 18 API calls 4807->4808 4809 401e17 4808->4809 4810 401446 18 API calls 4809->4810 4811 401e21 4810->4811 4812 4030e3 4811->4812 4814 405f7d wsprintfW 4811->4814 4814->4812 4815 40438f 4816 4043c8 4815->4816 4817 40439f 4815->4817 4818 403df6 8 API calls 4816->4818 4819 403d6b 19 API calls 4817->4819 4821 4043d4 4818->4821 4820 4043ac SetDlgItemTextW 4819->4820 4820->4816 4822 403f90 4823 403fa0 4822->4823 4824 403fbc 4822->4824 4833 405cb0 GetDlgItemTextW 4823->4833 4826 403fc2 SHGetPathFromIDListW 4824->4826 4827 403fef 4824->4827 4829 403fd2 4826->4829 4832 403fd9 SendMessageW 4826->4832 4828 403fad SendMessageW 4828->4824 4830 40141d 80 API calls 4829->4830 4830->4832 4832->4827 4833->4828 4834 402392 4835 40145c 18 API calls 4834->4835 4836 402399 4835->4836 4839 407224 4836->4839 4840 406efe 25 API calls 4839->4840 4841 407244 4840->4841 4842 4023a7 4841->4842 4843 40724e lstrcpynW lstrcmpW 4841->4843 4844 407280 4843->4844 4845 407286 lstrcpynW 4843->4845 4844->4845 4845->4842 3338 402713 3353 406035 lstrcpynW 3338->3353 3340 40272c 3354 406035 lstrcpynW 3340->3354 3342 402738 3343 402743 3342->3343 3344 40145c 18 API calls 3342->3344 3345 40145c 18 API calls 3343->3345 3347 402752 3343->3347 3344->3343 3345->3347 3348 40145c 18 API calls 3347->3348 3350 402761 3347->3350 3348->3350 3355 40145c 3350->3355 3353->3340 3354->3342 3363 406831 3355->3363 3358 401497 3360 4062cf lstrlenW wvsprintfW 3358->3360 3403 406113 3360->3403 3372 40683e 3363->3372 3364 406aab 3365 401488 3364->3365 3398 406035 lstrcpynW 3364->3398 3365->3358 3382 406064 3365->3382 3367 4068ff GetVersion 3377 40690c 3367->3377 3368 406a72 lstrlenW 3368->3372 3370 406831 10 API calls 3370->3368 3372->3364 3372->3367 3372->3368 3372->3370 3375 406064 5 API calls 3372->3375 3396 405f7d wsprintfW 3372->3396 3397 406035 lstrcpynW 3372->3397 3374 40697e GetSystemDirectoryW 3374->3377 3375->3372 3376 406991 GetWindowsDirectoryW 3376->3377 3377->3372 3377->3374 3377->3376 3378 406831 10 API calls 3377->3378 3379 406a0b lstrcatW 3377->3379 3380 4069c5 SHGetSpecialFolderLocation 3377->3380 3391 405eff RegOpenKeyExW 3377->3391 3378->3377 3379->3372 3380->3377 3381 4069dd SHGetPathFromIDListW CoTaskMemFree 3380->3381 3381->3377 3389 406071 3382->3389 3383 4060e7 3384 4060ed CharPrevW 3383->3384 3386 40610d 3383->3386 3384->3383 3385 4060da CharNextW 3385->3383 3385->3389 3386->3358 3388 4060c6 CharNextW 3388->3389 3389->3383 3389->3385 3389->3388 3390 4060d5 CharNextW 3389->3390 3399 405d32 3389->3399 3390->3385 3392 405f33 RegQueryValueExW 3391->3392 3393 405f78 3391->3393 3394 405f55 RegCloseKey 3392->3394 3393->3377 3394->3393 3396->3372 3397->3372 3398->3365 3400 405d38 3399->3400 3401 405d4e 3400->3401 3402 405d3f CharNextW 3400->3402 3401->3389 3402->3400 3404 40613c 3403->3404 3405 40611f 3403->3405 3407 4061b3 3404->3407 3408 406159 3404->3408 3409 40277f WritePrivateProfileStringW 3404->3409 3406 406129 CloseHandle 3405->3406 3405->3409 3406->3409 3407->3409 3410 4061bc lstrcatW lstrlenW WriteFile 3407->3410 3408->3410 3411 406162 GetFileAttributesW 3408->3411 3410->3409 3416 405e7c GetFileAttributesW CreateFileW 3411->3416 3413 40617e 3413->3409 3414 4061a8 SetFilePointer 3413->3414 3415 40618e WriteFile 3413->3415 3414->3407 3415->3414 3416->3413 4846 402797 4847 40145c 18 API calls 4846->4847 4848 4027ae 4847->4848 4849 40145c 18 API calls 4848->4849 4850 4027b7 4849->4850 4851 40145c 18 API calls 4850->4851 4852 4027c0 GetPrivateProfileStringW lstrcmpW 4851->4852 4853 401e9a 4854 40145c 18 API calls 4853->4854 4855 401ea1 4854->4855 4856 401446 18 API calls 4855->4856 4857 401eab wsprintfW 4856->4857 3817 401a1f 3818 40145c 18 API calls 3817->3818 3819 401a26 3818->3819 3820 4062cf 11 API calls 3819->3820 3821 401a49 3820->3821 3822 401a64 3821->3822 3823 401a5c 3821->3823 3892 406035 lstrcpynW 3822->3892 3891 406035 lstrcpynW 3823->3891 3826 401a6f 3893 40674e lstrlenW CharPrevW 3826->3893 3827 401a62 3830 406064 5 API calls 3827->3830 3861 401a81 3830->3861 3831 406301 2 API calls 3831->3861 3834 401a98 CompareFileTime 3834->3861 3835 401ba9 3836 404f9e 25 API calls 3835->3836 3838 401bb3 3836->3838 3837 401b5d 3839 404f9e 25 API calls 3837->3839 3870 40337f 3838->3870 3841 401b70 3839->3841 3845 4062cf 11 API calls 3841->3845 3843 406035 lstrcpynW 3843->3861 3844 4062cf 11 API calls 3846 401bda 3844->3846 3850 401b8b 3845->3850 3847 401be9 SetFileTime 3846->3847 3848 401bf8 CloseHandle 3846->3848 3847->3848 3848->3850 3851 401c09 3848->3851 3849 406831 18 API calls 3849->3861 3852 401c21 3851->3852 3853 401c0e 3851->3853 3854 406831 18 API calls 3852->3854 3855 406831 18 API calls 3853->3855 3856 401c29 3854->3856 3858 401c16 lstrcatW 3855->3858 3859 4062cf 11 API calls 3856->3859 3858->3856 3862 401c34 3859->3862 3860 401b50 3864 401b93 3860->3864 3865 401b53 3860->3865 3861->3831 3861->3834 3861->3835 3861->3837 3861->3843 3861->3849 3861->3860 3863 4062cf 11 API calls 3861->3863 3869 405e7c GetFileAttributesW CreateFileW 3861->3869 3896 405e5c GetFileAttributesW 3861->3896 3899 405ccc 3861->3899 3866 405ccc MessageBoxIndirectW 3862->3866 3863->3861 3867 4062cf 11 API calls 3864->3867 3868 4062cf 11 API calls 3865->3868 3866->3850 3867->3850 3868->3837 3869->3861 3871 40339a 3870->3871 3872 4033c7 3871->3872 3905 403368 SetFilePointer 3871->3905 3903 403336 ReadFile 3872->3903 3876 401bc6 3876->3844 3877 403546 3879 40354a 3877->3879 3880 40356e 3877->3880 3878 4033eb GetTickCount 3878->3876 3883 403438 3878->3883 3881 403336 ReadFile 3879->3881 3880->3876 3884 403336 ReadFile 3880->3884 3885 40358d WriteFile 3880->3885 3881->3876 3882 403336 ReadFile 3882->3883 3883->3876 3883->3882 3887 40348a GetTickCount 3883->3887 3888 4034af MulDiv wsprintfW 3883->3888 3890 4034f3 WriteFile 3883->3890 3884->3880 3885->3876 3886 4035a1 3885->3886 3886->3876 3886->3880 3887->3883 3889 404f9e 25 API calls 3888->3889 3889->3883 3890->3876 3890->3883 3891->3827 3892->3826 3894 401a75 lstrcatW 3893->3894 3895 40676b lstrcatW 3893->3895 3894->3827 3895->3894 3897 405e79 3896->3897 3898 405e6b SetFileAttributesW 3896->3898 3897->3861 3898->3897 3900 405ce1 3899->3900 3901 405d2f 3900->3901 3902 405cf7 MessageBoxIndirectW 3900->3902 3901->3861 3902->3901 3904 403357 3903->3904 3904->3876 3904->3877 3904->3878 3905->3872 4858 40209f GetDlgItem GetClientRect 4859 40145c 18 API calls 4858->4859 4860 4020cf LoadImageW SendMessageW 4859->4860 4861 4030e3 4860->4861 4862 4020ed DeleteObject 4860->4862 4862->4861 4863 402b9f 4864 401446 18 API calls 4863->4864 4868 402ba7 4864->4868 4865 402c4a 4866 402bdf ReadFile 4866->4868 4875 402c3d 4866->4875 4867 401446 18 API calls 4867->4875 4868->4865 4868->4866 4869 402c06 MultiByteToWideChar 4868->4869 4870 402c3f 4868->4870 4871 402c4f 4868->4871 4868->4875 4869->4868 4869->4871 4876 405f7d wsprintfW 4870->4876 4873 402c6b SetFilePointer 4871->4873 4871->4875 4873->4875 4874 402d17 ReadFile 4874->4875 4875->4865 4875->4867 4875->4874 4876->4865 4877 402b23 GlobalAlloc 4878 402b39 4877->4878 4879 402b4b 4877->4879 4880 401446 18 API calls 4878->4880 4881 40145c 18 API calls 4879->4881 4883 402b41 4880->4883 4882 402b52 WideCharToMultiByte lstrlenA 4881->4882 4882->4883 4884 402b84 WriteFile 4883->4884 4885 402b93 4883->4885 4884->4885 4886 402384 GlobalFree 4884->4886 4886->4885 4888 4040a3 4889 4040b0 lstrcpynW lstrlenW 4888->4889 4890 4040ad 4888->4890 4890->4889 3430 4054a5 3431 4055f9 3430->3431 3432 4054bd 3430->3432 3434 40564a 3431->3434 3435 40560a GetDlgItem GetDlgItem 3431->3435 3432->3431 3433 4054c9 3432->3433 3437 4054d4 SetWindowPos 3433->3437 3438 4054e7 3433->3438 3436 4056a4 3434->3436 3444 40139d 80 API calls 3434->3444 3439 403d6b 19 API calls 3435->3439 3445 4055f4 3436->3445 3500 403ddb 3436->3500 3437->3438 3441 405504 3438->3441 3442 4054ec ShowWindow 3438->3442 3443 405634 SetClassLongW 3439->3443 3446 405526 3441->3446 3447 40550c DestroyWindow 3441->3447 3442->3441 3448 40141d 80 API calls 3443->3448 3451 40567c 3444->3451 3449 40552b SetWindowLongW 3446->3449 3450 40553c 3446->3450 3452 405908 3447->3452 3448->3434 3449->3445 3453 4055e5 3450->3453 3454 405548 GetDlgItem 3450->3454 3451->3436 3455 405680 SendMessageW 3451->3455 3452->3445 3461 405939 ShowWindow 3452->3461 3520 403df6 3453->3520 3458 405578 3454->3458 3459 40555b SendMessageW IsWindowEnabled 3454->3459 3455->3445 3456 40141d 80 API calls 3469 4056b6 3456->3469 3457 40590a DestroyWindow KiUserCallbackDispatcher 3457->3452 3463 405585 3458->3463 3466 4055cc SendMessageW 3458->3466 3467 405598 3458->3467 3475 40557d 3458->3475 3459->3445 3459->3458 3461->3445 3462 406831 18 API calls 3462->3469 3463->3466 3463->3475 3465 403d6b 19 API calls 3465->3469 3466->3453 3470 4055a0 3467->3470 3471 4055b5 3467->3471 3468 4055b3 3468->3453 3469->3445 3469->3456 3469->3457 3469->3462 3469->3465 3491 40584a DestroyWindow 3469->3491 3503 403d6b 3469->3503 3514 40141d 3470->3514 3472 40141d 80 API calls 3471->3472 3474 4055bc 3472->3474 3474->3453 3474->3475 3517 403d44 3475->3517 3477 405731 GetDlgItem 3478 405746 3477->3478 3479 40574f ShowWindow KiUserCallbackDispatcher 3477->3479 3478->3479 3506 403db1 KiUserCallbackDispatcher 3479->3506 3481 405779 EnableWindow 3484 40578d 3481->3484 3482 405792 GetSystemMenu EnableMenuItem SendMessageW 3483 4057c2 SendMessageW 3482->3483 3482->3484 3483->3484 3484->3482 3507 403dc4 SendMessageW 3484->3507 3508 406035 lstrcpynW 3484->3508 3487 4057f0 lstrlenW 3488 406831 18 API calls 3487->3488 3489 405806 SetWindowTextW 3488->3489 3509 40139d 3489->3509 3491->3452 3492 405864 CreateDialogParamW 3491->3492 3492->3452 3493 405897 3492->3493 3494 403d6b 19 API calls 3493->3494 3495 4058a2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3494->3495 3496 40139d 80 API calls 3495->3496 3497 4058e8 3496->3497 3497->3445 3498 4058f0 ShowWindow 3497->3498 3499 403ddb SendMessageW 3498->3499 3499->3452 3501 403df3 3500->3501 3502 403de4 SendMessageW 3500->3502 3501->3469 3502->3501 3504 406831 18 API calls 3503->3504 3505 403d76 SetDlgItemTextW 3504->3505 3505->3477 3506->3481 3507->3484 3508->3487 3512 4013a4 3509->3512 3510 401410 3510->3469 3512->3510 3513 4013dd MulDiv SendMessageW 3512->3513 3534 4015a0 3512->3534 3513->3512 3515 40139d 80 API calls 3514->3515 3516 401432 3515->3516 3516->3475 3518 403d51 SendMessageW 3517->3518 3519 403d4b 3517->3519 3518->3468 3519->3518 3521 403e0b GetWindowLongW 3520->3521 3531 403e94 3520->3531 3522 403e1c 3521->3522 3521->3531 3523 403e2b GetSysColor 3522->3523 3524 403e2e 3522->3524 3523->3524 3525 403e34 SetTextColor 3524->3525 3526 403e3e SetBkMode 3524->3526 3525->3526 3527 403e56 GetSysColor 3526->3527 3528 403e5c 3526->3528 3527->3528 3529 403e63 SetBkColor 3528->3529 3530 403e6d 3528->3530 3529->3530 3530->3531 3532 403e80 DeleteObject 3530->3532 3533 403e87 CreateBrushIndirect 3530->3533 3531->3445 3532->3533 3533->3531 3535 4015fa 3534->3535 3614 40160c 3534->3614 3536 401601 3535->3536 3537 401742 3535->3537 3538 401962 3535->3538 3539 4019ca 3535->3539 3540 40176e 3535->3540 3541 401650 3535->3541 3542 4017b1 3535->3542 3543 401672 3535->3543 3544 401693 3535->3544 3545 401616 3535->3545 3546 4016d6 3535->3546 3547 401736 3535->3547 3548 401897 3535->3548 3549 4018db 3535->3549 3550 40163c 3535->3550 3551 4016bd 3535->3551 3535->3614 3560 4062cf 11 API calls 3536->3560 3552 401751 ShowWindow 3537->3552 3553 401758 3537->3553 3557 40145c 18 API calls 3538->3557 3564 40145c 18 API calls 3539->3564 3554 40145c 18 API calls 3540->3554 3578 4062cf 11 API calls 3541->3578 3558 40145c 18 API calls 3542->3558 3555 40145c 18 API calls 3543->3555 3559 401446 18 API calls 3544->3559 3563 40145c 18 API calls 3545->3563 3577 401446 18 API calls 3546->3577 3546->3614 3547->3614 3668 405f7d wsprintfW 3547->3668 3556 40145c 18 API calls 3548->3556 3561 40145c 18 API calls 3549->3561 3565 401647 PostQuitMessage 3550->3565 3550->3614 3562 4062cf 11 API calls 3551->3562 3552->3553 3566 401765 ShowWindow 3553->3566 3553->3614 3567 401775 3554->3567 3568 401678 3555->3568 3569 40189d 3556->3569 3570 401968 GetFullPathNameW 3557->3570 3571 4017b8 3558->3571 3572 40169a 3559->3572 3560->3614 3573 4018e2 3561->3573 3574 4016c7 SetForegroundWindow 3562->3574 3575 40161c 3563->3575 3576 4019d1 SearchPathW 3564->3576 3565->3614 3566->3614 3580 4062cf 11 API calls 3567->3580 3581 4062cf 11 API calls 3568->3581 3659 406301 FindFirstFileW 3569->3659 3583 4019a1 3570->3583 3584 40197f 3570->3584 3585 4062cf 11 API calls 3571->3585 3586 4062cf 11 API calls 3572->3586 3587 40145c 18 API calls 3573->3587 3574->3614 3588 4062cf 11 API calls 3575->3588 3576->3547 3576->3614 3577->3614 3589 401664 3578->3589 3590 401785 SetFileAttributesW 3580->3590 3591 401683 3581->3591 3603 4019b8 GetShortPathNameW 3583->3603 3583->3614 3584->3583 3609 406301 2 API calls 3584->3609 3593 4017c9 3585->3593 3594 4016a7 Sleep 3586->3594 3595 4018eb 3587->3595 3596 401627 3588->3596 3597 40139d 65 API calls 3589->3597 3598 40179a 3590->3598 3590->3614 3607 404f9e 25 API calls 3591->3607 3641 405d85 CharNextW CharNextW 3593->3641 3594->3614 3604 40145c 18 API calls 3595->3604 3605 404f9e 25 API calls 3596->3605 3597->3614 3606 4062cf 11 API calls 3598->3606 3599 4018c2 3610 4062cf 11 API calls 3599->3610 3600 4018a9 3608 4062cf 11 API calls 3600->3608 3603->3614 3612 4018f5 3604->3612 3605->3614 3606->3614 3607->3614 3608->3614 3613 401991 3609->3613 3610->3614 3611 4017d4 3615 401864 3611->3615 3618 405d32 CharNextW 3611->3618 3636 4062cf 11 API calls 3611->3636 3616 4062cf 11 API calls 3612->3616 3613->3583 3667 406035 lstrcpynW 3613->3667 3614->3512 3615->3591 3617 40186e 3615->3617 3619 401902 MoveFileW 3616->3619 3647 404f9e 3617->3647 3622 4017e6 CreateDirectoryW 3618->3622 3623 401912 3619->3623 3624 40191e 3619->3624 3622->3611 3626 4017fe GetLastError 3622->3626 3623->3591 3630 406301 2 API calls 3624->3630 3640 401942 3624->3640 3628 401827 GetFileAttributesW 3626->3628 3629 40180b GetLastError 3626->3629 3628->3611 3633 4062cf 11 API calls 3629->3633 3634 401929 3630->3634 3631 401882 SetCurrentDirectoryW 3631->3614 3632 4062cf 11 API calls 3635 40195c 3632->3635 3633->3611 3634->3640 3662 406c94 3634->3662 3635->3614 3636->3611 3639 404f9e 25 API calls 3639->3640 3640->3632 3642 405da2 3641->3642 3645 405db4 3641->3645 3644 405daf CharNextW 3642->3644 3642->3645 3643 405dd8 3643->3611 3644->3643 3645->3643 3646 405d32 CharNextW 3645->3646 3646->3645 3648 404fb7 3647->3648 3649 401875 3647->3649 3650 404fd5 lstrlenW 3648->3650 3651 406831 18 API calls 3648->3651 3658 406035 lstrcpynW 3649->3658 3652 404fe3 lstrlenW 3650->3652 3653 404ffe 3650->3653 3651->3650 3652->3649 3654 404ff5 lstrcatW 3652->3654 3655 405011 3653->3655 3656 405004 SetWindowTextW 3653->3656 3654->3653 3655->3649 3657 405017 SendMessageW SendMessageW SendMessageW 3655->3657 3656->3655 3657->3649 3658->3631 3660 4018a5 3659->3660 3661 406317 FindClose 3659->3661 3660->3599 3660->3600 3661->3660 3669 406328 GetModuleHandleA 3662->3669 3666 401936 3666->3639 3667->3583 3668->3614 3670 406340 LoadLibraryA 3669->3670 3671 40634b GetProcAddress 3669->3671 3670->3671 3672 406359 3670->3672 3671->3672 3672->3666 3673 406ac5 lstrcpyW 3672->3673 3674 406b13 GetShortPathNameW 3673->3674 3675 406aea 3673->3675 3676 406b2c 3674->3676 3677 406c8e 3674->3677 3699 405e7c GetFileAttributesW CreateFileW 3675->3699 3676->3677 3680 406b34 WideCharToMultiByte 3676->3680 3677->3666 3679 406af3 CloseHandle GetShortPathNameW 3679->3677 3681 406b0b 3679->3681 3680->3677 3682 406b51 WideCharToMultiByte 3680->3682 3681->3674 3681->3677 3682->3677 3683 406b69 wsprintfA 3682->3683 3684 406831 18 API calls 3683->3684 3685 406b95 3684->3685 3700 405e7c GetFileAttributesW CreateFileW 3685->3700 3687 406ba2 3687->3677 3688 406baf GetFileSize GlobalAlloc 3687->3688 3689 406bd0 ReadFile 3688->3689 3690 406c84 CloseHandle 3688->3690 3689->3690 3691 406bea 3689->3691 3690->3677 3691->3690 3701 405de2 lstrlenA 3691->3701 3694 406c03 lstrcpyA 3697 406c25 3694->3697 3695 406c17 3696 405de2 4 API calls 3695->3696 3696->3697 3698 406c5c SetFilePointer WriteFile GlobalFree 3697->3698 3698->3690 3699->3679 3700->3687 3702 405e23 lstrlenA 3701->3702 3703 405e2b 3702->3703 3704 405dfc lstrcmpiA 3702->3704 3703->3694 3703->3695 3704->3703 3705 405e1a CharNextA 3704->3705 3705->3702 4891 402da5 4892 4030e3 4891->4892 4893 402dac 4891->4893 4894 401446 18 API calls 4893->4894 4895 402db8 4894->4895 4896 402dbf SetFilePointer 4895->4896 4896->4892 4897 402dcf 4896->4897 4897->4892 4899 405f7d wsprintfW 4897->4899 4899->4892 4900 4049a8 GetDlgItem GetDlgItem 4901 4049fe 7 API calls 4900->4901 4906 404c16 4900->4906 4902 404aa2 DeleteObject 4901->4902 4903 404a96 SendMessageW 4901->4903 4904 404aad 4902->4904 4903->4902 4907 404ae4 4904->4907 4910 406831 18 API calls 4904->4910 4905 404cfb 4908 404da0 4905->4908 4909 404c09 4905->4909 4914 404d4a SendMessageW 4905->4914 4906->4905 4918 40487a 5 API calls 4906->4918 4931 404c86 4906->4931 4913 403d6b 19 API calls 4907->4913 4911 404db5 4908->4911 4912 404da9 SendMessageW 4908->4912 4915 403df6 8 API calls 4909->4915 4916 404ac6 SendMessageW SendMessageW 4910->4916 4923 404dc7 ImageList_Destroy 4911->4923 4924 404dce 4911->4924 4929 404dde 4911->4929 4912->4911 4919 404af8 4913->4919 4914->4909 4921 404d5f SendMessageW 4914->4921 4922 404f97 4915->4922 4916->4904 4917 404ced SendMessageW 4917->4905 4918->4931 4925 403d6b 19 API calls 4919->4925 4920 404f48 4920->4909 4930 404f5d ShowWindow GetDlgItem ShowWindow 4920->4930 4926 404d72 4921->4926 4923->4924 4927 404dd7 GlobalFree 4924->4927 4924->4929 4933 404b09 4925->4933 4935 404d83 SendMessageW 4926->4935 4927->4929 4928 404bd6 GetWindowLongW SetWindowLongW 4932 404bf0 4928->4932 4929->4920 4934 40141d 80 API calls 4929->4934 4944 404e10 4929->4944 4930->4909 4931->4905 4931->4917 4936 404bf6 ShowWindow 4932->4936 4937 404c0e 4932->4937 4933->4928 4939 404b65 SendMessageW 4933->4939 4940 404bd0 4933->4940 4942 404b93 SendMessageW 4933->4942 4943 404ba7 SendMessageW 4933->4943 4934->4944 4935->4908 4951 403dc4 SendMessageW 4936->4951 4952 403dc4 SendMessageW 4937->4952 4939->4933 4940->4928 4940->4932 4942->4933 4943->4933 4945 404e54 4944->4945 4948 404e3e SendMessageW 4944->4948 4946 404f1f InvalidateRect 4945->4946 4950 404ecd SendMessageW SendMessageW 4945->4950 4946->4920 4947 404f35 4946->4947 4949 4043d9 21 API calls 4947->4949 4948->4945 4949->4920 4950->4945 4951->4909 4952->4906 4953 4030a9 SendMessageW 4954 4030c2 InvalidateRect 4953->4954 4955 4030e3 4953->4955 4954->4955 3906 4038af #17 SetErrorMode OleInitialize 3907 406328 3 API calls 3906->3907 3908 4038f2 SHGetFileInfoW 3907->3908 3980 406035 lstrcpynW 3908->3980 3910 40391d GetCommandLineW 3981 406035 lstrcpynW 3910->3981 3912 40392f GetModuleHandleW 3913 403947 3912->3913 3914 405d32 CharNextW 3913->3914 3915 403956 CharNextW 3914->3915 3926 403968 3915->3926 3916 403a02 3917 403a21 GetTempPathW 3916->3917 3982 4037f8 3917->3982 3919 403a37 3921 403a3b GetWindowsDirectoryW lstrcatW 3919->3921 3922 403a5f DeleteFileW 3919->3922 3920 405d32 CharNextW 3920->3926 3924 4037f8 11 API calls 3921->3924 3990 4035b3 GetTickCount GetModuleFileNameW 3922->3990 3927 403a57 3924->3927 3925 403a73 3928 403af8 3925->3928 3930 405d32 CharNextW 3925->3930 3966 403add 3925->3966 3926->3916 3926->3920 3933 403a04 3926->3933 3927->3922 3927->3928 4075 403885 3928->4075 3934 403a8a 3930->3934 4082 406035 lstrcpynW 3933->4082 3945 403b23 lstrcatW lstrcmpiW 3934->3945 3946 403ab5 3934->3946 3935 403aed 3938 406113 9 API calls 3935->3938 3936 403bfa 3939 403c7d 3936->3939 3941 406328 3 API calls 3936->3941 3937 403b0d 3940 405ccc MessageBoxIndirectW 3937->3940 3938->3928 3942 403b1b ExitProcess 3940->3942 3944 403c09 3941->3944 3948 406328 3 API calls 3944->3948 3945->3928 3947 403b3f CreateDirectoryW SetCurrentDirectoryW 3945->3947 4083 4067aa 3946->4083 3950 403b62 3947->3950 3951 403b57 3947->3951 3952 403c12 3948->3952 4100 406035 lstrcpynW 3950->4100 4099 406035 lstrcpynW 3951->4099 3956 406328 3 API calls 3952->3956 3959 403c1b 3956->3959 3958 403b70 4101 406035 lstrcpynW 3958->4101 3960 403c69 ExitWindowsEx 3959->3960 3965 403c29 GetCurrentProcess 3959->3965 3960->3939 3964 403c76 3960->3964 3961 403ad2 4098 406035 lstrcpynW 3961->4098 3967 40141d 80 API calls 3964->3967 3969 403c39 3965->3969 4018 405958 3966->4018 3967->3939 3968 406831 18 API calls 3970 403b98 DeleteFileW 3968->3970 3969->3960 3971 403ba5 CopyFileW 3970->3971 3977 403b7f 3970->3977 3971->3977 3972 403bee 3973 406c94 42 API calls 3972->3973 3975 403bf5 3973->3975 3974 406c94 42 API calls 3974->3977 3975->3928 3976 406831 18 API calls 3976->3977 3977->3968 3977->3972 3977->3974 3977->3976 3979 403bd9 CloseHandle 3977->3979 4102 405c6b CreateProcessW 3977->4102 3979->3977 3980->3910 3981->3912 3983 406064 5 API calls 3982->3983 3984 403804 3983->3984 3985 40380e 3984->3985 3986 40674e 3 API calls 3984->3986 3985->3919 3987 403816 CreateDirectoryW 3986->3987 3988 405eab 2 API calls 3987->3988 3989 40382a 3988->3989 3989->3919 4105 405e7c GetFileAttributesW CreateFileW 3990->4105 3992 4035f3 4012 403603 3992->4012 4106 406035 lstrcpynW 3992->4106 3994 403619 4107 40677d lstrlenW 3994->4107 3998 40362a GetFileSize 3999 403726 3998->3999 4013 403641 3998->4013 4112 4032d2 3999->4112 4001 40372f 4003 40376b GlobalAlloc 4001->4003 4001->4012 4124 403368 SetFilePointer 4001->4124 4002 403336 ReadFile 4002->4013 4123 403368 SetFilePointer 4003->4123 4006 4037e9 4009 4032d2 6 API calls 4006->4009 4007 403786 4010 40337f 33 API calls 4007->4010 4008 40374c 4011 403336 ReadFile 4008->4011 4009->4012 4016 403792 4010->4016 4015 403757 4011->4015 4012->3925 4013->3999 4013->4002 4013->4006 4013->4012 4014 4032d2 6 API calls 4013->4014 4014->4013 4015->4003 4015->4012 4016->4012 4016->4016 4017 4037c0 SetFilePointer 4016->4017 4017->4012 4019 406328 3 API calls 4018->4019 4020 40596c 4019->4020 4021 405972 4020->4021 4022 405984 4020->4022 4138 405f7d wsprintfW 4021->4138 4023 405eff 3 API calls 4022->4023 4024 4059b5 4023->4024 4026 4059d4 lstrcatW 4024->4026 4028 405eff 3 API calls 4024->4028 4027 405982 4026->4027 4129 403ec1 4027->4129 4028->4026 4031 4067aa 18 API calls 4032 405a06 4031->4032 4033 405a9c 4032->4033 4035 405eff 3 API calls 4032->4035 4034 4067aa 18 API calls 4033->4034 4036 405aa2 4034->4036 4037 405a38 4035->4037 4038 405ab2 4036->4038 4039 406831 18 API calls 4036->4039 4037->4033 4041 405a5b lstrlenW 4037->4041 4044 405d32 CharNextW 4037->4044 4040 405ad2 LoadImageW 4038->4040 4140 403ea0 4038->4140 4039->4038 4042 405b92 4040->4042 4043 405afd RegisterClassW 4040->4043 4045 405a69 lstrcmpiW 4041->4045 4046 405a8f 4041->4046 4050 40141d 80 API calls 4042->4050 4048 405b9c 4043->4048 4049 405b45 SystemParametersInfoW CreateWindowExW 4043->4049 4051 405a56 4044->4051 4045->4046 4052 405a79 GetFileAttributesW 4045->4052 4054 40674e 3 API calls 4046->4054 4048->3935 4049->4042 4055 405b98 4050->4055 4051->4041 4056 405a85 4052->4056 4053 405ac8 4053->4040 4057 405a95 4054->4057 4055->4048 4058 403ec1 19 API calls 4055->4058 4056->4046 4059 40677d 2 API calls 4056->4059 4139 406035 lstrcpynW 4057->4139 4061 405ba9 4058->4061 4059->4046 4062 405bb5 ShowWindow LoadLibraryW 4061->4062 4063 405c38 4061->4063 4064 405bd4 LoadLibraryW 4062->4064 4065 405bdb GetClassInfoW 4062->4065 4066 405073 83 API calls 4063->4066 4064->4065 4067 405c05 DialogBoxParamW 4065->4067 4068 405bef GetClassInfoW RegisterClassW 4065->4068 4069 405c3e 4066->4069 4072 40141d 80 API calls 4067->4072 4068->4067 4070 405c42 4069->4070 4071 405c5a 4069->4071 4070->4048 4074 40141d 80 API calls 4070->4074 4073 40141d 80 API calls 4071->4073 4072->4048 4073->4048 4074->4048 4076 40389d 4075->4076 4077 40388f CloseHandle 4075->4077 4147 403caf 4076->4147 4077->4076 4082->3917 4200 406035 lstrcpynW 4083->4200 4085 4067bb 4086 405d85 4 API calls 4085->4086 4087 4067c1 4086->4087 4088 406064 5 API calls 4087->4088 4095 403ac3 4087->4095 4091 4067d1 4088->4091 4089 406809 lstrlenW 4090 406810 4089->4090 4089->4091 4093 40674e 3 API calls 4090->4093 4091->4089 4092 406301 2 API calls 4091->4092 4091->4095 4096 40677d 2 API calls 4091->4096 4092->4091 4094 406816 GetFileAttributesW 4093->4094 4094->4095 4095->3928 4097 406035 lstrcpynW 4095->4097 4096->4089 4097->3961 4098->3966 4099->3950 4100->3958 4101->3977 4103 405ca6 4102->4103 4104 405c9a CloseHandle 4102->4104 4103->3977 4104->4103 4105->3992 4106->3994 4108 40678c 4107->4108 4109 406792 CharPrevW 4108->4109 4110 40361f 4108->4110 4109->4108 4109->4110 4111 406035 lstrcpynW 4110->4111 4111->3998 4113 4032f3 4112->4113 4114 4032db 4112->4114 4117 403303 GetTickCount 4113->4117 4118 4032fb 4113->4118 4115 4032e4 DestroyWindow 4114->4115 4116 4032eb 4114->4116 4115->4116 4116->4001 4120 403311 CreateDialogParamW ShowWindow 4117->4120 4121 403334 4117->4121 4125 40635e 4118->4125 4120->4121 4121->4001 4123->4007 4124->4008 4126 40637b PeekMessageW 4125->4126 4127 406371 DispatchMessageW 4126->4127 4128 403301 4126->4128 4127->4126 4128->4001 4130 403ed5 4129->4130 4145 405f7d wsprintfW 4130->4145 4132 403f49 4133 406831 18 API calls 4132->4133 4134 403f55 SetWindowTextW 4133->4134 4135 403f70 4134->4135 4136 403f8b 4135->4136 4137 406831 18 API calls 4135->4137 4136->4031 4137->4135 4138->4027 4139->4033 4146 406035 lstrcpynW 4140->4146 4142 403eb4 4143 40674e 3 API calls 4142->4143 4144 403eba lstrcatW 4143->4144 4144->4053 4145->4132 4146->4142 4148 403cbd 4147->4148 4149 4038a2 4148->4149 4150 403cc2 FreeLibrary GlobalFree 4148->4150 4151 406cc7 4149->4151 4150->4149 4150->4150 4152 4067aa 18 API calls 4151->4152 4153 406cda 4152->4153 4154 406ce3 DeleteFileW 4153->4154 4155 406cfa 4153->4155 4194 4038ae CoUninitialize 4154->4194 4156 406e77 4155->4156 4198 406035 lstrcpynW 4155->4198 4162 406301 2 API calls 4156->4162 4182 406e84 4156->4182 4156->4194 4158 406d25 4159 406d39 4158->4159 4160 406d2f lstrcatW 4158->4160 4163 40677d 2 API calls 4159->4163 4161 406d3f 4160->4161 4165 406d4f lstrcatW 4161->4165 4167 406d57 lstrlenW FindFirstFileW 4161->4167 4164 406e90 4162->4164 4163->4161 4168 40674e 3 API calls 4164->4168 4164->4194 4165->4167 4166 4062cf 11 API calls 4166->4194 4171 406e67 4167->4171 4195 406d7e 4167->4195 4169 406e9a 4168->4169 4172 4062cf 11 API calls 4169->4172 4170 405d32 CharNextW 4170->4195 4171->4156 4173 406ea5 4172->4173 4174 405e5c 2 API calls 4173->4174 4175 406ead RemoveDirectoryW 4174->4175 4179 406ef0 4175->4179 4180 406eb9 4175->4180 4176 406e44 FindNextFileW 4178 406e5c FindClose 4176->4178 4176->4195 4178->4171 4181 404f9e 25 API calls 4179->4181 4180->4182 4183 406ebf 4180->4183 4181->4194 4182->4166 4185 4062cf 11 API calls 4183->4185 4184 4062cf 11 API calls 4184->4195 4186 406ec9 4185->4186 4189 404f9e 25 API calls 4186->4189 4187 406cc7 72 API calls 4187->4195 4188 405e5c 2 API calls 4190 406dfa DeleteFileW 4188->4190 4191 406ed3 4189->4191 4190->4195 4192 406c94 42 API calls 4191->4192 4192->4194 4193 404f9e 25 API calls 4193->4176 4194->3936 4194->3937 4195->4170 4195->4176 4195->4184 4195->4187 4195->4188 4195->4193 4196 404f9e 25 API calls 4195->4196 4197 406c94 42 API calls 4195->4197 4199 406035 lstrcpynW 4195->4199 4196->4195 4197->4195 4198->4158 4199->4195 4200->4085 4956 401cb2 4957 40145c 18 API calls 4956->4957 4958 401c54 4957->4958 4959 4062cf 11 API calls 4958->4959 4960 401c64 4958->4960 4961 401c59 4959->4961 4962 406cc7 81 API calls 4961->4962 4962->4960 3706 4021b5 3707 40145c 18 API calls 3706->3707 3708 4021bb 3707->3708 3709 40145c 18 API calls 3708->3709 3710 4021c4 3709->3710 3711 40145c 18 API calls 3710->3711 3712 4021cd 3711->3712 3713 40145c 18 API calls 3712->3713 3714 4021d6 3713->3714 3715 404f9e 25 API calls 3714->3715 3716 4021e2 ShellExecuteW 3715->3716 3717 40221b 3716->3717 3718 40220d 3716->3718 3719 4062cf 11 API calls 3717->3719 3720 4062cf 11 API calls 3718->3720 3721 402230 3719->3721 3720->3717 4963 402238 4964 40145c 18 API calls 4963->4964 4965 40223e 4964->4965 4966 4062cf 11 API calls 4965->4966 4967 40224b 4966->4967 4968 404f9e 25 API calls 4967->4968 4969 402255 4968->4969 4970 405c6b 2 API calls 4969->4970 4971 40225b 4970->4971 4972 4062cf 11 API calls 4971->4972 4980 4022ac CloseHandle 4971->4980 4977 40226d 4972->4977 4974 4030e3 4975 402283 WaitForSingleObject 4976 402291 GetExitCodeProcess 4975->4976 4975->4977 4979 4022a3 4976->4979 4976->4980 4977->4975 4978 40635e 2 API calls 4977->4978 4977->4980 4978->4975 4982 405f7d wsprintfW 4979->4982 4980->4974 4982->4980 3782 401eb9 3783 401f24 3782->3783 3786 401ec6 3782->3786 3784 401f53 GlobalAlloc 3783->3784 3788 401f28 3783->3788 3790 406831 18 API calls 3784->3790 3785 401ed5 3789 4062cf 11 API calls 3785->3789 3786->3785 3792 401ef7 3786->3792 3787 401f36 3806 406035 lstrcpynW 3787->3806 3788->3787 3791 4062cf 11 API calls 3788->3791 3801 401ee2 3789->3801 3794 401f46 3790->3794 3791->3787 3804 406035 lstrcpynW 3792->3804 3796 402708 3794->3796 3797 402387 GlobalFree 3794->3797 3797->3796 3798 401f06 3805 406035 lstrcpynW 3798->3805 3799 406831 18 API calls 3799->3801 3801->3796 3801->3799 3802 401f15 3807 406035 lstrcpynW 3802->3807 3804->3798 3805->3802 3806->3794 3807->3796 4983 404039 4984 404096 4983->4984 4985 404046 lstrcpynA lstrlenA 4983->4985 4985->4984 4986 404077 4985->4986 4986->4984 4987 404083 GlobalFree 4986->4987 4987->4984

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 4050f9-405114 1 4052c1-4052c8 0->1 2 40511a-405201 GetDlgItem * 3 call 403dc4 call 4044a2 call 406831 call 4062cf GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052f2-4052ff 1->3 4 4052ca-4052ec GetDlgItem CreateThread CloseHandle 1->4 35 405203-40521d SendMessageW * 2 2->35 36 40521f-405222 2->36 6 405320-405327 3->6 7 405301-40530a 3->7 4->3 11 405329-40532f 6->11 12 40537e-405382 6->12 9 405342-40534b call 403df6 7->9 10 40530c-40531b ShowWindow * 2 call 403dc4 7->10 22 405350-405354 9->22 10->6 16 405331-40533d call 403d44 11->16 17 405357-405367 ShowWindow 11->17 12->9 14 405384-405387 12->14 14->9 20 405389-40539c SendMessageW 14->20 16->9 23 405377-405379 call 403d44 17->23 24 405369-405372 call 404f9e 17->24 29 4053a2-4053c3 CreatePopupMenu call 406831 AppendMenuW 20->29 30 4052ba-4052bc 20->30 23->12 24->23 37 4053c5-4053d6 GetWindowRect 29->37 38 4053d8-4053de 29->38 30->22 35->36 39 405232-405249 call 403d6b 36->39 40 405224-405230 SendMessageW 36->40 41 4053df-4053f7 TrackPopupMenu 37->41 38->41 46 40524b-40525f ShowWindow 39->46 47 40527f-4052a0 GetDlgItem SendMessageW 39->47 40->39 41->30 43 4053fd-405414 41->43 45 405419-405434 SendMessageW 43->45 45->45 48 405436-405459 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 49 405261-40526c ShowWindow 46->49 50 40526e 46->50 47->30 51 4052a2-4052b8 SendMessageW * 2 47->51 52 40545b-405484 SendMessageW 48->52 54 405274-40527a call 403dc4 49->54 50->54 51->30 52->52 53 405486-4054a0 GlobalUnlock SetClipboardData CloseClipboard 52->53 53->30 54->47
                                                                APIs
                                                                • GetDlgItem.USER32(?,00000403), ref: 0040515B
                                                                • GetDlgItem.USER32(?,000003EE), ref: 0040516A
                                                                • GetClientRect.USER32(?,?), ref: 004051C2
                                                                • GetSystemMetrics.USER32(00000015), ref: 004051CA
                                                                • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051EB
                                                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051FC
                                                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040520F
                                                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040521D
                                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405230
                                                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405252
                                                                • ShowWindow.USER32(?,00000008), ref: 00405266
                                                                • GetDlgItem.USER32(?,000003EC), ref: 00405287
                                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405297
                                                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052AC
                                                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052B8
                                                                • GetDlgItem.USER32(?,000003F8), ref: 00405179
                                                                  • Part of subcall function 00403DC4: SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                  • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00424576,74DF23A0,00000000), ref: 00406902
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                • GetDlgItem.USER32(?,000003EC), ref: 004052D7
                                                                • CreateThread.KERNELBASE(00000000,00000000,Function_00005073,00000000), ref: 004052E5
                                                                • CloseHandle.KERNELBASE(00000000), ref: 004052EC
                                                                • ShowWindow.USER32(00000000), ref: 00405313
                                                                • ShowWindow.USER32(?,00000008), ref: 00405318
                                                                • ShowWindow.USER32(00000008), ref: 0040535F
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405391
                                                                • CreatePopupMenu.USER32 ref: 004053A2
                                                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053B7
                                                                • GetWindowRect.USER32(?,?), ref: 004053CA
                                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053EC
                                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405427
                                                                • OpenClipboard.USER32(00000000), ref: 00405437
                                                                • EmptyClipboard.USER32 ref: 0040543D
                                                                • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 00405449
                                                                • GlobalLock.KERNEL32(00000000), ref: 00405453
                                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405467
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00405489
                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00405494
                                                                • CloseClipboard.USER32 ref: 0040549A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                • String ID: New install of "%s" to "%s"${
                                                                • API String ID: 2110491804-1641061399
                                                                • Opcode ID: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                • Instruction ID: db3ff0878cedf1d1b3e6f9985675ba3e3c8e3ad145c0decdf5c07b0ce3ef5d1a
                                                                • Opcode Fuzzy Hash: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                • Instruction Fuzzy Hash: 46B15970900609BFEB11AFA1DD89EAE7B79FB04354F00803AFA05BA1A1C7755E81DF58

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 202 4038af-403945 #17 SetErrorMode OleInitialize call 406328 SHGetFileInfoW call 406035 GetCommandLineW call 406035 GetModuleHandleW 209 403947-40394a 202->209 210 40394f-403963 call 405d32 CharNextW 202->210 209->210 213 4039f6-4039fc 210->213 214 403a02 213->214 215 403968-40396e 213->215 216 403a21-403a39 GetTempPathW call 4037f8 214->216 217 403970-403976 215->217 218 403978-40397c 215->218 228 403a3b-403a59 GetWindowsDirectoryW lstrcatW call 4037f8 216->228 229 403a5f-403a79 DeleteFileW call 4035b3 216->229 217->217 217->218 219 403984-403988 218->219 220 40397e-403983 218->220 222 4039e4-4039f1 call 405d32 219->222 223 40398a-403991 219->223 220->219 222->213 237 4039f3 222->237 226 403993-40399a 223->226 227 4039a6-4039b8 call 40382c 223->227 232 4039a1 226->232 233 40399c-40399f 226->233 242 4039ba-4039c1 227->242 243 4039cd-4039e2 call 40382c 227->243 228->229 240 403af8-403b07 call 403885 CoUninitialize 228->240 229->240 241 403a7b-403a81 229->241 232->227 233->227 233->232 237->213 257 403bfa-403c00 240->257 258 403b0d-403b1d call 405ccc ExitProcess 240->258 244 403ae1-403ae8 call 405958 241->244 245 403a83-403a8c call 405d32 241->245 247 4039c3-4039c6 242->247 248 4039c8 242->248 243->222 254 403a04-403a1c call 40824c call 406035 243->254 256 403aed-403af3 call 406113 244->256 260 403aa5-403aa7 245->260 247->243 247->248 248->243 254->216 256->240 262 403c02-403c1f call 406328 * 3 257->262 263 403c7d-403c85 257->263 267 403aa9-403ab3 260->267 268 403a8e-403aa0 call 40382c 260->268 293 403c21-403c23 262->293 294 403c69-403c74 ExitWindowsEx 262->294 269 403c87 263->269 270 403c8b 263->270 275 403b23-403b3d lstrcatW lstrcmpiW 267->275 276 403ab5-403ac5 call 4067aa 267->276 268->267 283 403aa2 268->283 269->270 275->240 277 403b3f-403b55 CreateDirectoryW SetCurrentDirectoryW 275->277 276->240 286 403ac7-403add call 406035 * 2 276->286 281 403b62-403b82 call 406035 * 2 277->281 282 403b57-403b5d call 406035 277->282 303 403b87-403ba3 call 406831 DeleteFileW 281->303 282->281 283->260 286->244 293->294 297 403c25-403c27 293->297 294->263 300 403c76-403c78 call 40141d 294->300 297->294 301 403c29-403c3b GetCurrentProcess 297->301 300->263 301->294 308 403c3d-403c5f 301->308 309 403be4-403bec 303->309 310 403ba5-403bb5 CopyFileW 303->310 308->294 309->303 311 403bee-403bf5 call 406c94 309->311 310->309 312 403bb7-403bd7 call 406c94 call 406831 call 405c6b 310->312 311->240 312->309 322 403bd9-403be0 CloseHandle 312->322 322->309
                                                                APIs
                                                                • #17.COMCTL32 ref: 004038CE
                                                                • SetErrorMode.KERNELBASE(00008001), ref: 004038D9
                                                                • OleInitialize.OLE32(00000000), ref: 004038E0
                                                                  • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                  • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                  • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                • SHGetFileInfoW.SHELL32(0040A264,00000000,?,000002B4,00000000), ref: 00403908
                                                                  • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                • GetCommandLineW.KERNEL32(00476AA0,NSIS Error), ref: 0040391D
                                                                • GetModuleHandleW.KERNEL32(00000000,004CF0A0,00000000), ref: 00403930
                                                                • CharNextW.USER32(00000000,004CF0A0,00000020), ref: 00403957
                                                                • GetTempPathW.KERNEL32(00002004,004E30C8,00000000,00000020), ref: 00403A2C
                                                                • GetWindowsDirectoryW.KERNEL32(004E30C8,00001FFF), ref: 00403A41
                                                                • lstrcatW.KERNEL32(004E30C8,\Temp), ref: 00403A4D
                                                                • DeleteFileW.KERNELBASE(004DF0C0), ref: 00403A64
                                                                • CoUninitialize.COMBASE(?), ref: 00403AFD
                                                                • ExitProcess.KERNEL32 ref: 00403B1D
                                                                • lstrcatW.KERNEL32(004E30C8,~nsu.tmp), ref: 00403B29
                                                                • lstrcmpiW.KERNEL32(004E30C8,004DB0B8,004E30C8,~nsu.tmp), ref: 00403B35
                                                                • CreateDirectoryW.KERNEL32(004E30C8,00000000), ref: 00403B41
                                                                • SetCurrentDirectoryW.KERNEL32(004E30C8), ref: 00403B48
                                                                • DeleteFileW.KERNEL32(0043DD40,0043DD40,?,00483008,0040A204,0047F000,?), ref: 00403B99
                                                                • CopyFileW.KERNEL32(004EB0D8,0043DD40,00000001), ref: 00403BAD
                                                                • CloseHandle.KERNEL32(00000000,0043DD40,0043DD40,?,0043DD40,00000000), ref: 00403BDA
                                                                • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C30
                                                                • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C6C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                                                • API String ID: 2435955865-3712954417
                                                                • Opcode ID: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                • Instruction ID: 6e3717b9be2730fff72f59090edb21b77de3e5055cb75e9aafb2752c1f1d7b94
                                                                • Opcode Fuzzy Hash: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                • Instruction Fuzzy Hash: 1DA1E6715443117AD720BF629C4AE1B7EACAB0470AF10443FF545B62D2D7BD8A448BAE

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 825 406301-406315 FindFirstFileW 826 406322 825->826 827 406317-406320 FindClose 825->827 828 406324-406325 826->828 827->828
                                                                APIs
                                                                • FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                • FindClose.KERNEL32(00000000), ref: 00406318
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Find$CloseFileFirst
                                                                • String ID: jF
                                                                • API String ID: 2295610775-3349280890
                                                                • Opcode ID: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                • Instruction ID: ae54cbf5f70e9060ab25dbcc7d0ddb8e13a77f3b50f8061b144b06f1ffcf0783
                                                                • Opcode Fuzzy Hash: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                • Instruction Fuzzy Hash: C8D01231A141215BD7105778AD0C89B7E9CDF0A330366CA32F866F11F5D3348C2186ED
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: AddressHandleLibraryLoadModuleProc
                                                                • String ID:
                                                                • API String ID: 310444273-0
                                                                • Opcode ID: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                • Instruction ID: 7c6873576e710d3586a353c563cf751ff2fc1cfd2ce2d1275f1b712779c4e249
                                                                • Opcode Fuzzy Hash: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                • Instruction Fuzzy Hash: A8D01232200111D7C7005FA5AD48A5FB77DAE95A11706843AF902F3171E734D911E6EC

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 56 4015a0-4015f4 57 4030e3-4030ec 56->57 58 4015fa 56->58 86 4030ee-4030f2 57->86 60 401601-401611 call 4062cf 58->60 61 401742-40174f 58->61 62 401962-40197d call 40145c GetFullPathNameW 58->62 63 4019ca-4019e6 call 40145c SearchPathW 58->63 64 40176e-401794 call 40145c call 4062cf SetFileAttributesW 58->64 65 401650-40166d call 40137e call 4062cf call 40139d 58->65 66 4017b1-4017d8 call 40145c call 4062cf call 405d85 58->66 67 401672-401686 call 40145c call 4062cf 58->67 68 401693-4016ac call 401446 call 4062cf 58->68 69 401715-401731 58->69 70 401616-40162d call 40145c call 4062cf call 404f9e 58->70 71 4016d6-4016db 58->71 72 401736-40173d 58->72 73 401897-4018a7 call 40145c call 406301 58->73 74 4018db-401910 call 40145c * 3 call 4062cf MoveFileW 58->74 75 40163c-401645 58->75 76 4016bd-4016d1 call 4062cf SetForegroundWindow 58->76 60->86 77 401751-401755 ShowWindow 61->77 78 401758-40175f 61->78 117 4019a3-4019a8 62->117 118 40197f-401984 62->118 63->57 123 4019ec-4019f8 63->123 64->57 136 40179a-4017a6 call 4062cf 64->136 65->86 160 401864-40186c 66->160 161 4017de-4017fc call 405d32 CreateDirectoryW 66->161 137 401689-40168e call 404f9e 67->137 142 4016b1-4016b8 Sleep 68->142 143 4016ae-4016b0 68->143 69->86 94 401632-401637 70->94 92 401702-401710 71->92 93 4016dd-4016fd call 401446 71->93 96 4030dd-4030de 72->96 138 4018c2-4018d6 call 4062cf 73->138 139 4018a9-4018bd call 4062cf 73->139 172 401912-401919 74->172 173 40191e-401921 74->173 75->94 95 401647-40164e PostQuitMessage 75->95 76->57 77->78 78->57 99 401765-401769 ShowWindow 78->99 92->57 93->57 94->86 95->94 96->57 113 4030de call 405f7d 96->113 99->57 113->57 130 4019af-4019b2 117->130 129 401986-401989 118->129 118->130 123->57 123->96 129->130 140 40198b-401993 call 406301 129->140 130->57 144 4019b8-4019c5 GetShortPathNameW 130->144 155 4017ab-4017ac 136->155 137->57 138->86 139->86 140->117 165 401995-4019a1 call 406035 140->165 142->57 143->142 144->57 155->57 163 401890-401892 160->163 164 40186e-40188b call 404f9e call 406035 SetCurrentDirectoryW 160->164 176 401846-40184e call 4062cf 161->176 177 4017fe-401809 GetLastError 161->177 163->137 164->57 165->130 172->137 178 401923-40192b call 406301 173->178 179 40194a-401950 173->179 192 401853-401854 176->192 182 401827-401832 GetFileAttributesW 177->182 183 40180b-401825 GetLastError call 4062cf 177->183 178->179 193 40192d-401948 call 406c94 call 404f9e 178->193 181 401957-40195d call 4062cf 179->181 181->155 190 401834-401844 call 4062cf 182->190 191 401855-40185e 182->191 183->191 190->192 191->160 191->161 192->191 193->181
                                                                APIs
                                                                • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                • ShowWindow.USER32(?), ref: 00401753
                                                                • ShowWindow.USER32(?), ref: 00401767
                                                                • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                • SetCurrentDirectoryW.KERNELBASE(?,004D70B0,?,000000E6,004100F0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,004100F0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                Strings
                                                                • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                • detailprint: %s, xrefs: 00401679
                                                                • SetFileAttributes failed., xrefs: 004017A1
                                                                • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                • Aborting: "%s", xrefs: 0040161D
                                                                • Call: %d, xrefs: 0040165A
                                                                • Rename failed: %s, xrefs: 0040194B
                                                                • Rename on reboot: %s, xrefs: 00401943
                                                                • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                • CreateDirectory: "%s" created, xrefs: 00401849
                                                                • Rename: %s, xrefs: 004018F8
                                                                • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                • BringToFront, xrefs: 004016BD
                                                                • Sleep(%d), xrefs: 0040169D
                                                                • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                • Jump: %d, xrefs: 00401602
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                • API String ID: 2872004960-3619442763
                                                                • Opcode ID: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                • Instruction ID: d546d874ac51cf0a7c72b7d7aee7a5a926bf82a1b22bfeef9e4f81a1fba4758f
                                                                • Opcode Fuzzy Hash: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                • Instruction Fuzzy Hash: 9EB1F435A00214ABDB10BFA1DD55DAE3F69EF44324B21817FF806B61E2DA3D4E40C66D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 323 4054a5-4054b7 324 4055f9-405608 323->324 325 4054bd-4054c3 323->325 327 405657-40566c 324->327 328 40560a-405652 GetDlgItem * 2 call 403d6b SetClassLongW call 40141d 324->328 325->324 326 4054c9-4054d2 325->326 331 4054d4-4054e1 SetWindowPos 326->331 332 4054e7-4054ea 326->332 329 4056ac-4056b1 call 403ddb 327->329 330 40566e-405671 327->330 328->327 342 4056b6-4056d1 329->342 334 405673-40567e call 40139d 330->334 335 4056a4-4056a6 330->335 331->332 337 405504-40550a 332->337 338 4054ec-4054fe ShowWindow 332->338 334->335 356 405680-40569f SendMessageW 334->356 335->329 341 40594c 335->341 343 405526-405529 337->343 344 40550c-405521 DestroyWindow 337->344 338->337 351 40594e-405955 341->351 349 4056d3-4056d5 call 40141d 342->349 350 4056da-4056e0 342->350 346 40552b-405537 SetWindowLongW 343->346 347 40553c-405542 343->347 352 405929-40592f 344->352 346->351 354 4055e5-4055f4 call 403df6 347->354 355 405548-405559 GetDlgItem 347->355 349->350 359 4056e6-4056f1 350->359 360 40590a-405923 DestroyWindow KiUserCallbackDispatcher 350->360 352->341 357 405931-405937 352->357 354->351 361 405578-40557b 355->361 362 40555b-405572 SendMessageW IsWindowEnabled 355->362 356->351 357->341 364 405939-405942 ShowWindow 357->364 359->360 365 4056f7-405744 call 406831 call 403d6b * 3 GetDlgItem 359->365 360->352 366 405580-405583 361->366 367 40557d-40557e 361->367 362->341 362->361 364->341 393 405746-40574c 365->393 394 40574f-40578b ShowWindow KiUserCallbackDispatcher call 403db1 EnableWindow 365->394 372 405591-405596 366->372 373 405585-40558b 366->373 371 4055ae-4055b3 call 403d44 367->371 371->354 376 4055cc-4055df SendMessageW 372->376 378 405598-40559e 372->378 373->376 377 40558d-40558f 373->377 376->354 377->371 381 4055a0-4055a6 call 40141d 378->381 382 4055b5-4055be call 40141d 378->382 391 4055ac 381->391 382->354 390 4055c0-4055ca 382->390 390->391 391->371 393->394 397 405790 394->397 398 40578d-40578e 394->398 399 405792-4057c0 GetSystemMenu EnableMenuItem SendMessageW 397->399 398->399 400 4057c2-4057d3 SendMessageW 399->400 401 4057d5 399->401 402 4057db-405819 call 403dc4 call 406035 lstrlenW call 406831 SetWindowTextW call 40139d 400->402 401->402 402->342 411 40581f-405821 402->411 411->342 412 405827-40582b 411->412 413 40584a-40585e DestroyWindow 412->413 414 40582d-405833 412->414 413->352 416 405864-405891 CreateDialogParamW 413->416 414->341 415 405839-40583f 414->415 415->342 418 405845 415->418 416->352 417 405897-4058ee call 403d6b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 416->417 417->341 423 4058f0-405903 ShowWindow call 403ddb 417->423 418->341 425 405908 423->425 425->352
                                                                APIs
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054E1
                                                                • ShowWindow.USER32(?), ref: 004054FE
                                                                • DestroyWindow.USER32 ref: 00405512
                                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040552E
                                                                • GetDlgItem.USER32(?,?), ref: 0040554F
                                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405563
                                                                • IsWindowEnabled.USER32(00000000), ref: 0040556A
                                                                • GetDlgItem.USER32(?,00000001), ref: 00405619
                                                                • GetDlgItem.USER32(?,00000002), ref: 00405623
                                                                • SetClassLongW.USER32(?,000000F2,?), ref: 0040563D
                                                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040568E
                                                                • GetDlgItem.USER32(?,00000003), ref: 00405734
                                                                • ShowWindow.USER32(00000000,?), ref: 00405756
                                                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00405768
                                                                • EnableWindow.USER32(?,?), ref: 00405783
                                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405799
                                                                • EnableMenuItem.USER32(00000000), ref: 004057A0
                                                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057B8
                                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057CB
                                                                • lstrlenW.KERNEL32(00451D98,?,00451D98,00476AA0), ref: 004057F4
                                                                • SetWindowTextW.USER32(?,00451D98), ref: 00405808
                                                                • ShowWindow.USER32(?,0000000A), ref: 0040593C
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                • String ID:
                                                                • API String ID: 3282139019-0
                                                                • Opcode ID: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                • Instruction ID: f960999a9681c69a960cfafceaa395f4ab6c0ab2fcbff8166cb7657a87eea2d0
                                                                • Opcode Fuzzy Hash: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                • Instruction Fuzzy Hash: 13C189B1500A04FBDB216F61ED89E2B7BA9EB49715F00093EF506B11F1C6399881DF2E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 426 405958-405970 call 406328 429 405972-405982 call 405f7d 426->429 430 405984-4059bc call 405eff 426->430 439 4059df-405a08 call 403ec1 call 4067aa 429->439 435 4059d4-4059da lstrcatW 430->435 436 4059be-4059cf call 405eff 430->436 435->439 436->435 444 405a9c-405aa4 call 4067aa 439->444 445 405a0e-405a13 439->445 451 405ab2-405ab9 444->451 452 405aa6-405aad call 406831 444->452 445->444 447 405a19-405a41 call 405eff 445->447 447->444 453 405a43-405a47 447->453 455 405ad2-405af7 LoadImageW 451->455 456 405abb-405ac1 451->456 452->451 457 405a49-405a58 call 405d32 453->457 458 405a5b-405a67 lstrlenW 453->458 460 405b92-405b9a call 40141d 455->460 461 405afd-405b3f RegisterClassW 455->461 456->455 459 405ac3-405ac8 call 403ea0 456->459 457->458 463 405a69-405a77 lstrcmpiW 458->463 464 405a8f-405a97 call 40674e call 406035 458->464 459->455 475 405ba4-405baf call 403ec1 460->475 476 405b9c-405b9f 460->476 466 405c61 461->466 467 405b45-405b8d SystemParametersInfoW CreateWindowExW 461->467 463->464 471 405a79-405a83 GetFileAttributesW 463->471 464->444 470 405c63-405c6a 466->470 467->460 477 405a85-405a87 471->477 478 405a89-405a8a call 40677d 471->478 484 405bb5-405bd2 ShowWindow LoadLibraryW 475->484 485 405c38-405c39 call 405073 475->485 476->470 477->464 477->478 478->464 486 405bd4-405bd9 LoadLibraryW 484->486 487 405bdb-405bed GetClassInfoW 484->487 491 405c3e-405c40 485->491 486->487 489 405c05-405c28 DialogBoxParamW call 40141d 487->489 490 405bef-405bff GetClassInfoW RegisterClassW 487->490 497 405c2d-405c36 call 403c94 489->497 490->489 492 405c42-405c48 491->492 493 405c5a-405c5c call 40141d 491->493 492->476 495 405c4e-405c55 call 40141d 492->495 493->466 495->476 497->470
                                                                APIs
                                                                  • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                  • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                  • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                • lstrcatW.KERNEL32(004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0,-00000002,00000000,004E30C8,00403AED,?), ref: 004059DA
                                                                • lstrlenW.KERNEL32(0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0), ref: 00405A5C
                                                                • lstrcmpiW.KERNEL32(0046E218,.exe,0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000), ref: 00405A6F
                                                                • GetFileAttributesW.KERNEL32(0046E220), ref: 00405A7A
                                                                  • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004D30A8), ref: 00405AE3
                                                                • RegisterClassW.USER32(00476A40), ref: 00405B36
                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B4E
                                                                • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B87
                                                                  • Part of subcall function 00403EC1: SetWindowTextW.USER32(00000000,00476AA0), ref: 00403F5C
                                                                • ShowWindow.USER32(00000005,00000000), ref: 00405BBD
                                                                • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BCE
                                                                • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BD9
                                                                • GetClassInfoW.USER32(00000000,RichEdit20A,00476A40), ref: 00405BE9
                                                                • GetClassInfoW.USER32(00000000,RichEdit,00476A40), ref: 00405BF6
                                                                • RegisterClassW.USER32(00476A40), ref: 00405BFF
                                                                • DialogBoxParamW.USER32(?,00000000,004054A5,00000000), ref: 00405C1E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                • String ID: F$"F$.DEFAULT\Control Panel\International$.exe$@jG$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                • API String ID: 608394941-2746725676
                                                                • Opcode ID: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                • Instruction ID: c846f8899feab6000a015ad3d9ba4b80e1385b5ee8e185a3118195eaaf4def2f
                                                                • Opcode Fuzzy Hash: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                • Instruction Fuzzy Hash: 53719175600705AEE710AB65AD89E2B37ACEB44718F00453FF906B62E2D778AC41CF6D

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                • lstrcatW.KERNEL32(00000000,00000000,AuditHappening,004D70B0,00000000,00000000), ref: 00401A76
                                                                • CompareFileTime.KERNEL32(-00000014,?,AuditHappening,AuditHappening,00000000,00000000,AuditHappening,004D70B0,00000000,00000000), ref: 00401AA0
                                                                  • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                  • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00424576,74DF23A0,00000000), ref: 00404FD6
                                                                  • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00424576,74DF23A0,00000000), ref: 00404FE6
                                                                  • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00424576,74DF23A0,00000000), ref: 00404FF9
                                                                  • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                • String ID: AuditHappening$File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"
                                                                • API String ID: 4286501637-1591570721
                                                                • Opcode ID: 64a557673ae3d0e019bdca1bc4e77ebfe7370d638d91dc23aa74aa5952768e1c
                                                                • Instruction ID: 90fa90950dbbf035c4f81507b49f49b55cd41b97b653845b504dd01eb698d819
                                                                • Opcode Fuzzy Hash: 64a557673ae3d0e019bdca1bc4e77ebfe7370d638d91dc23aa74aa5952768e1c
                                                                • Instruction Fuzzy Hash: 8B512931901214BADB10BBB5CC46EEE3979EF05378B20423FF416B11E2DB3C9A518A6D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 587 4035b3-403601 GetTickCount GetModuleFileNameW call 405e7c 590 403603-403608 587->590 591 40360d-40363b call 406035 call 40677d call 406035 GetFileSize 587->591 592 4037e2-4037e6 590->592 599 403641 591->599 600 403728-403736 call 4032d2 591->600 602 403646-40365d 599->602 606 4037f1-4037f6 600->606 607 40373c-40373f 600->607 604 403661-403663 call 403336 602->604 605 40365f 602->605 611 403668-40366a 604->611 605->604 606->592 609 403741-403759 call 403368 call 403336 607->609 610 40376b-403795 GlobalAlloc call 403368 call 40337f 607->610 609->606 638 40375f-403765 609->638 610->606 636 403797-4037a8 610->636 614 403670-403677 611->614 615 4037e9-4037f0 call 4032d2 611->615 616 4036f3-4036f7 614->616 617 403679-40368d call 405e38 614->617 615->606 623 403701-403707 616->623 624 4036f9-403700 call 4032d2 616->624 617->623 634 40368f-403696 617->634 627 403716-403720 623->627 628 403709-403713 call 4072ad 623->628 624->623 627->602 635 403726 627->635 628->627 634->623 640 403698-40369f 634->640 635->600 641 4037b0-4037b3 636->641 642 4037aa 636->642 638->606 638->610 640->623 643 4036a1-4036a8 640->643 644 4037b6-4037be 641->644 642->641 643->623 645 4036aa-4036b1 643->645 644->644 646 4037c0-4037db SetFilePointer call 405e38 644->646 645->623 647 4036b3-4036d3 645->647 650 4037e0 646->650 647->606 649 4036d9-4036dd 647->649 651 4036e5-4036ed 649->651 652 4036df-4036e3 649->652 650->592 651->623 653 4036ef-4036f1 651->653 652->635 652->651 653->623
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 004035C4
                                                                • GetModuleFileNameW.KERNEL32(00000000,004EB0D8,00002004,?,?,?,00000000,00403A73,?), ref: 004035E0
                                                                  • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                  • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                • GetFileSize.KERNEL32(00000000,00000000,004EF0E0,00000000,004DB0B8,004DB0B8,004EB0D8,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 0040362C
                                                                Strings
                                                                • Null, xrefs: 004036AA
                                                                • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037F1
                                                                • Error launching installer, xrefs: 00403603
                                                                • soft, xrefs: 004036A1
                                                                • Inst, xrefs: 00403698
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                • API String ID: 4283519449-527102705
                                                                • Opcode ID: 60015d4ad0f4b5f5eae55729fc88f45e330dc420916319a7d833a41d7a943f83
                                                                • Instruction ID: dd9ffda97dac1e18d9081c595fe0b3a994810ea71df15e1d022794f6b5594c79
                                                                • Opcode Fuzzy Hash: 60015d4ad0f4b5f5eae55729fc88f45e330dc420916319a7d833a41d7a943f83
                                                                • Instruction Fuzzy Hash: 8551B8B1900214AFDB20DFA5DC85B9E7EACAB1435AF60857BF905B72D1C7389E408B5C

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 654 40337f-403398 655 4033a1-4033a9 654->655 656 40339a 654->656 657 4033b2-4033b7 655->657 658 4033ab 655->658 656->655 659 4033c7-4033d4 call 403336 657->659 660 4033b9-4033c2 call 403368 657->660 658->657 664 4033d6 659->664 665 4033de-4033e5 659->665 660->659 666 4033d8-4033d9 664->666 667 403546-403548 665->667 668 4033eb-403432 GetTickCount 665->668 671 403567-40356b 666->671 669 40354a-40354d 667->669 670 4035ac-4035af 667->670 672 403564 668->672 673 403438-403440 668->673 674 403552-40355b call 403336 669->674 675 40354f 669->675 676 4035b1 670->676 677 40356e-403574 670->677 672->671 678 403442 673->678 679 403445-403453 call 403336 673->679 674->664 687 403561 674->687 675->674 676->672 682 403576 677->682 683 403579-403587 call 403336 677->683 678->679 679->664 688 403455-40345e 679->688 682->683 683->664 691 40358d-40359f WriteFile 683->691 687->672 690 403464-403484 call 4076a0 688->690 697 403538-40353a 690->697 698 40348a-40349d GetTickCount 690->698 693 4035a1-4035a4 691->693 694 40353f-403541 691->694 693->694 696 4035a6-4035a9 693->696 694->666 696->670 697->666 699 4034e8-4034ec 698->699 700 40349f-4034a7 698->700 701 40352d-403530 699->701 702 4034ee-4034f1 699->702 703 4034a9-4034ad 700->703 704 4034af-4034e0 MulDiv wsprintfW call 404f9e 700->704 701->673 708 403536 701->708 706 403513-40351e 702->706 707 4034f3-403507 WriteFile 702->707 703->699 703->704 709 4034e5 704->709 711 403521-403525 706->711 707->694 710 403509-40350c 707->710 708->672 709->699 710->694 712 40350e-403511 710->712 711->690 713 40352b 711->713 712->711 713->672
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 004033F1
                                                                • GetTickCount.KERNEL32 ref: 00403492
                                                                • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004034BB
                                                                • wsprintfW.USER32 ref: 004034CE
                                                                • WriteFile.KERNELBASE(00000000,00000000,00424576,00403792,00000000), ref: 004034FF
                                                                • WriteFile.KERNEL32(00000000,00420170,?,00000000,00000000,00420170,?,000000FF,00000004,00000000,00000000,00000000), ref: 00403597
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: CountFileTickWrite$wsprintf
                                                                • String ID: (]C$... %d%%$pAB$vEB
                                                                • API String ID: 651206458-396865716
                                                                • Opcode ID: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                • Instruction ID: 38da17626370685da8d32df628044978fcb9abff53cdf920ebdff1c577d6aec0
                                                                • Opcode Fuzzy Hash: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                • Instruction Fuzzy Hash: BE615D71900219EBCF10DF69ED8469E7FBCAB54356F10413BE810B72A0D7789E90CBA9

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 714 404f9e-404fb1 715 404fb7-404fca 714->715 716 40506e-405070 714->716 717 404fd5-404fe1 lstrlenW 715->717 718 404fcc-404fd0 call 406831 715->718 720 404fe3-404ff3 lstrlenW 717->720 721 404ffe-405002 717->721 718->717 722 404ff5-404ff9 lstrcatW 720->722 723 40506c-40506d 720->723 724 405011-405015 721->724 725 405004-40500b SetWindowTextW 721->725 722->721 723->716 726 405017-405059 SendMessageW * 3 724->726 727 40505b-40505d 724->727 725->724 726->727 727->723 728 40505f-405064 727->728 728->723
                                                                APIs
                                                                • lstrlenW.KERNEL32(00445D80,00424576,74DF23A0,00000000), ref: 00404FD6
                                                                • lstrlenW.KERNEL32(004034E5,00445D80,00424576,74DF23A0,00000000), ref: 00404FE6
                                                                • lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00424576,74DF23A0,00000000), ref: 00404FF9
                                                                • SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                  • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00424576,74DF23A0,00000000), ref: 00406902
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                • String ID:
                                                                • API String ID: 2740478559-0
                                                                • Opcode ID: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                • Instruction ID: 2ad3572104664f977ebc3f2c903ed8e4223e657edd1a0c85de02785a0cf57670
                                                                • Opcode Fuzzy Hash: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                • Instruction Fuzzy Hash: CD219DB1800518BBDF119F65CD849CFBFB9EF45714F10803AF905B22A1C7794A909B98

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 729 401eb9-401ec4 730 401f24-401f26 729->730 731 401ec6-401ec9 729->731 732 401f53-401f69 GlobalAlloc call 406831 730->732 733 401f28-401f2a 730->733 734 401ed5-401ee3 call 4062cf 731->734 735 401ecb-401ecf 731->735 745 401f6e-401f7b 732->745 736 401f3c-401f4e call 406035 733->736 737 401f2c-401f36 call 4062cf 733->737 747 401ee4-402702 call 406831 734->747 735->731 738 401ed1-401ed3 735->738 751 402387-40238d GlobalFree 736->751 737->736 738->734 742 401ef7-402e50 call 406035 * 3 738->742 750 4030e3-4030f2 742->750 745->750 745->751 762 402708-40270e 747->762 751->750 762->750
                                                                APIs
                                                                  • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                • GlobalFree.KERNEL32(0092DF88), ref: 00402387
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: FreeGloballstrcpyn
                                                                • String ID: AuditHappening$Exch: stack < %d elements$Pop: stack empty
                                                                • API String ID: 1459762280-3334197172
                                                                • Opcode ID: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                • Instruction ID: 50a08f61e59307d203ec8fda99e8a78aa4432658e9e299f93ea532572e85a124
                                                                • Opcode Fuzzy Hash: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                • Instruction Fuzzy Hash: 4921FF72640001EBD710EF98DD81A6E77A8AA04358720413BF503F32E1DB799C11966D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 764 402713-40273b call 406035 * 2 769 402746-402749 764->769 770 40273d-402743 call 40145c 764->770 772 402755-402758 769->772 773 40274b-402752 call 40145c 769->773 770->769 776 402764-40278c call 40145c call 4062cf WritePrivateProfileStringW 772->776 777 40275a-402761 call 40145c 772->777 773->772 777->776
                                                                APIs
                                                                  • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfileStringWritelstrcpyn
                                                                • String ID: <RM>$AuditHappening$WriteINIStr: wrote [%s] %s=%s in %s
                                                                • API String ID: 247603264-4294291212
                                                                • Opcode ID: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                • Instruction ID: 073f588d32262f2f2aee4dc53e9f390c64699363c3e1a285ed73a3087a8005e5
                                                                • Opcode Fuzzy Hash: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                • Instruction Fuzzy Hash: FF014471D4022AABCB117FA68DC99EE7978AF08345B10403FF115761E3D7B80940CBAD

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 785 4021b5-40220b call 40145c * 4 call 404f9e ShellExecuteW 796 402223-4030f2 call 4062cf 785->796 797 40220d-40221b call 4062cf 785->797 797->796
                                                                APIs
                                                                  • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00424576,74DF23A0,00000000), ref: 00404FD6
                                                                  • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00424576,74DF23A0,00000000), ref: 00404FE6
                                                                  • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00424576,74DF23A0,00000000), ref: 00404FF9
                                                                  • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004D70B0,?), ref: 00402202
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                Strings
                                                                • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                • API String ID: 3156913733-2180253247
                                                                • Opcode ID: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                • Instruction ID: 745ed8f2a75272e62c3db2eabdadd847eb541a5ed47e1f4d533bb28834579f01
                                                                • Opcode Fuzzy Hash: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                • Instruction Fuzzy Hash: CD01F7B2B4021076D72076B69C87FAB2A5CDB81768B20447BF502F60D3E57D8C40D138

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 805 405eab-405eb7 806 405eb8-405eec GetTickCount GetTempFileNameW 805->806 807 405efb-405efd 806->807 808 405eee-405ef0 806->808 810 405ef5-405ef8 807->810 808->806 809 405ef2 808->809 809->810
                                                                APIs
                                                                • GetTickCount.KERNEL32 ref: 00405EC9
                                                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040382A,004DF0C0,004E30C8), ref: 00405EE4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: CountFileNameTempTick
                                                                • String ID: nsa
                                                                • API String ID: 1716503409-2209301699
                                                                • Opcode ID: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                • Instruction ID: e8a8b8b1c64af8904643f6899c21fc71a506a3659d4cdc328e790c9301f5e3ed
                                                                • Opcode Fuzzy Hash: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                • Instruction Fuzzy Hash: D8F09076600208BBDB10CF69DD05A9FBBBDEF95710F00803BE944E7250E6B09E50DB98

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 811 402175-40218b call 401446 * 2 816 402198-40219d 811->816 817 40218d-402197 call 4062cf 811->817 818 4021aa-4021b0 EnableWindow 816->818 819 40219f-4021a5 ShowWindow 816->819 817->816 821 4030e3-4030f2 818->821 819->821
                                                                APIs
                                                                • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Window$EnableShowlstrlenwvsprintf
                                                                • String ID: HideWindow
                                                                • API String ID: 1249568736-780306582
                                                                • Opcode ID: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                • Instruction ID: f8c041d4f94449417b74c9df8c85987c6128e61f091d6cc810bdb42da7a8293a
                                                                • Opcode Fuzzy Hash: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                • Instruction Fuzzy Hash: 13E0D832A04110DBDB08FFF5A64959E76B4EE9532A72104BFE103F61D2DA7D4D01C62D
                                                                APIs
                                                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                • Instruction ID: 11189a7010c7ef4f551f6273c6f502c25af520ce36bbf29b1e3929f99495605f
                                                                • Opcode Fuzzy Hash: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                • Instruction Fuzzy Hash: 64F02831A10220DBD7165B349C08B273799BB81354F258637F819F62F2D2B8CC41CB4C
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: File$AttributesCreate
                                                                • String ID:
                                                                • API String ID: 415043291-0
                                                                • Opcode ID: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                • Instruction ID: 4537c79132fc6b4e07af9f6f4ddc5e1db4475248beafdc935845b7fb5ee8fdc2
                                                                • Opcode Fuzzy Hash: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                • Instruction Fuzzy Hash: 08D09E71558202EFEF098F60DD1AF6EBBA2EB94B00F11852CB252550F1D6B25819DB15
                                                                APIs
                                                                • GetFileAttributesW.KERNELBASE(?,00406EAD,?,?,?), ref: 00405E60
                                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E73
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                • Instruction ID: cfdb79520ecdf627421b2718222ef799ef1344ba1afc56e39be72dea6d7b0432
                                                                • Opcode Fuzzy Hash: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                • Instruction Fuzzy Hash: 25C04C71404905BBDA015B34DE09D1BBB66EFA1331B648735F4BAE01F1C7358C65DA19
                                                                APIs
                                                                • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID:
                                                                • API String ID: 2738559852-0
                                                                • Opcode ID: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                • Instruction ID: 6ac59f4cb3fe35c1316d0bdd9a7bfda3bd496f009ebd6252a63c396af269f63e
                                                                • Opcode Fuzzy Hash: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                • Instruction Fuzzy Hash: 17E08C32650118FFDB109EA69C84EE73B5CFB047A2F00C432BD55E5190DA30DA00EBA4
                                                                APIs
                                                                  • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                  • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                  • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                  • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                • CreateDirectoryW.KERNELBASE(004E30C8,00000000,004E30C8,004E30C8,004E30C8,-00000002,00403A37), ref: 00403819
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$CreateDirectoryPrev
                                                                • String ID:
                                                                • API String ID: 4115351271-0
                                                                • Opcode ID: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                • Instruction ID: c72586207ca4fe3275e323c6ce7a55902ce0015f7edb1a19efdc0f2786dab76c
                                                                • Opcode Fuzzy Hash: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                • Instruction Fuzzy Hash: 52D0921218293121C66237663D0ABCF195C4F92B2EB0280B7F942B61D69B6C4A9285EE
                                                                APIs
                                                                • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                • Instruction ID: 85c9fcbfeeb581dd75f9c62538f5ff43d76368f59f1a6e3d2bff8e12452ff276
                                                                • Opcode Fuzzy Hash: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                • Instruction Fuzzy Hash: 0FC04C75644201BBDA108B509D45F077759AB90701F1584257615F50E0C674D550D62C
                                                                APIs
                                                                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403786,?,?,?,?,00000000,00403A73,?), ref: 00403376
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: FilePointer
                                                                • String ID:
                                                                • API String ID: 973152223-0
                                                                • Opcode ID: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                • Instruction ID: a45aac6c24818fd8413ddab5752014fb5f73d741524c96ff6ff4c62981ea4fba
                                                                • Opcode Fuzzy Hash: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                • Instruction Fuzzy Hash: 83B01231640200FFEA214F50DE09F06BB21B794700F208430B350380F082711820EB0C
                                                                APIs
                                                                • SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                • Instruction ID: 19f7ed481b0b3084dfc48602985d3e47af739273f13ec77122cd0735a5794091
                                                                • Opcode Fuzzy Hash: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                • Instruction Fuzzy Hash: CCB01235181200BBDE514B00DE0AF867F62F7A8701F008574B305640F0C6B204E0DB09
                                                                APIs
                                                                • KiUserCallbackDispatcher.NTDLL(?,00405779), ref: 00403DBB
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: CallbackDispatcherUser
                                                                • String ID:
                                                                • API String ID: 2492992576-0
                                                                • Opcode ID: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                • Instruction ID: a171dc49094d5971c6211130fd655c06747b54d01a1b52cbafa865c71f5bacad
                                                                • Opcode Fuzzy Hash: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                • Instruction Fuzzy Hash: 2CA001BA845500ABCA439B60EF0988ABA62BBA5701B11897AE6565103587325864EB19
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003F9), ref: 004049BF
                                                                • GetDlgItem.USER32(?,00000408), ref: 004049CC
                                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A1B
                                                                • LoadBitmapW.USER32(0000006E), ref: 00404A2E
                                                                • SetWindowLongW.USER32(?,000000FC,Function_000048F8), ref: 00404A48
                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A5A
                                                                • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A6E
                                                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404A84
                                                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A90
                                                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404AA0
                                                                • DeleteObject.GDI32(?), ref: 00404AA5
                                                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AD0
                                                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ADC
                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B7D
                                                                • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404BA0
                                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BB1
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404BDB
                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BEA
                                                                • ShowWindow.USER32(?,00000005), ref: 00404BFB
                                                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CF9
                                                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D54
                                                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D69
                                                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D8D
                                                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DB3
                                                                • ImageList_Destroy.COMCTL32(?), ref: 00404DC8
                                                                • GlobalFree.KERNEL32(?), ref: 00404DD8
                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E48
                                                                • SendMessageW.USER32(?,00001102,?,?), ref: 00404EF6
                                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F05
                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F25
                                                                • ShowWindow.USER32(?,00000000), ref: 00404F75
                                                                • GetDlgItem.USER32(?,000003FE), ref: 00404F80
                                                                • ShowWindow.USER32(00000000), ref: 00404F87
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                • String ID: $ @$M$N
                                                                • API String ID: 1638840714-3479655940
                                                                • Opcode ID: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                • Instruction ID: ef4bce446953bc7ec7e60756d12a1063aab4f745b4df8f164389f1335a379dc2
                                                                • Opcode Fuzzy Hash: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                • Instruction Fuzzy Hash: 7B028DB090020AAFEF109F95CD45AAE7BB5FB84314F10417AF611BA2E1C7B89D91CF58
                                                                APIs
                                                                • DeleteFileW.KERNEL32(?,?,004CF0A0), ref: 00406CE4
                                                                • lstrcatW.KERNEL32(00467470,\*.*,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D35
                                                                • lstrcatW.KERNEL32(?,00409838,?,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D55
                                                                • lstrlenW.KERNEL32(?), ref: 00406D58
                                                                • FindFirstFileW.KERNEL32(00467470,?), ref: 00406D6C
                                                                • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E4E
                                                                • FindClose.KERNEL32(?), ref: 00406E5F
                                                                Strings
                                                                • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EBF
                                                                • Delete: DeleteFile failed("%s"), xrefs: 00406E29
                                                                • Delete: DeleteFile on Reboot("%s"), xrefs: 00406E0C
                                                                • Delete: DeleteFile("%s"), xrefs: 00406DE8
                                                                • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E84
                                                                • \*.*, xrefs: 00406D2F
                                                                • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EDC
                                                                • RMDir: RemoveDirectory("%s"), xrefs: 00406E9B
                                                                • ptF, xrefs: 00406D1A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*$ptF
                                                                • API String ID: 2035342205-1650287579
                                                                • Opcode ID: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                • Instruction ID: e61cf0fe73e9c947a39cb72df690d6d83a08ee9d5dae9ef8ba60e8d8024aa79e
                                                                • Opcode Fuzzy Hash: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                • Instruction Fuzzy Hash: 3E51D225604305AADB11AB71CC49A7F37B89F41728F22803FF803761D2DB7C49A1D6AE
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003F0), ref: 00404525
                                                                • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404533
                                                                • GetDlgItem.USER32(?,000003FB), ref: 00404553
                                                                • GetAsyncKeyState.USER32(00000010), ref: 0040455A
                                                                • GetDlgItem.USER32(?,000003F0), ref: 0040456F
                                                                • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404580
                                                                • SetWindowTextW.USER32(?,?), ref: 004045AF
                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00404669
                                                                • lstrcmpiW.KERNEL32(0046E220,00451D98,00000000,?,?), ref: 004046A6
                                                                • lstrcatW.KERNEL32(?,0046E220), ref: 004046B2
                                                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046C2
                                                                • CoTaskMemFree.OLE32(00000000), ref: 00404674
                                                                  • Part of subcall function 00405CB0: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403FAD), ref: 00405CC3
                                                                  • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                  • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                  • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                  • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                  • Part of subcall function 00403EA0: lstrcatW.KERNEL32(00000000,00000000,00476240,004D30A8,install.log,00405AC8,004D30A8,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006), ref: 00403EBB
                                                                • GetDiskFreeSpaceW.KERNEL32(0044DD90,?,?,0000040F,?,0044DD90,0044DD90,?,00000000,0044DD90,?,?,000003FB,?), ref: 00404785
                                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047A0
                                                                  • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00424576,74DF23A0,00000000), ref: 00406902
                                                                • SetDlgItemTextW.USER32(00000000,00000400,0040A264), ref: 00404819
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                • String ID: F$A
                                                                • API String ID: 3347642858-1281894373
                                                                • Opcode ID: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                • Instruction ID: 610cab7253faed09e83e35c18a41c8795a2522a57bd741f73bb79fe4ae4f2c97
                                                                • Opcode Fuzzy Hash: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                • Instruction Fuzzy Hash: A3B181B1900209BBDB11AFA1CC85AAF7BB8EF45315F10843BFA05B72D1D77C9A418B59
                                                                APIs
                                                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F5C
                                                                • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FD5
                                                                • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FE1
                                                                • lstrcmpA.KERNEL32(name,?), ref: 00406FF3
                                                                • CloseHandle.KERNEL32(?), ref: 00407212
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                • API String ID: 1916479912-1189179171
                                                                • Opcode ID: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                • Instruction ID: 0b41acfa2c3272d6dc61f6848418d9961a63ce1f0aee58dce5ac99f5834af97b
                                                                • Opcode Fuzzy Hash: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                • Instruction Fuzzy Hash: 8491CB70D1412DAADF05EBE5C9908FEBBBAEF58301F00406AF592F7290E2385A05DB75
                                                                APIs
                                                                • GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00424576,74DF23A0,00000000), ref: 00406902
                                                                • GetSystemDirectoryW.KERNEL32(0046E220,00002004), ref: 00406984
                                                                  • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                • GetWindowsDirectoryW.KERNEL32(0046E220,00002004), ref: 00406997
                                                                • lstrcatW.KERNEL32(0046E220,\Microsoft\Internet Explorer\Quick Launch), ref: 00406A11
                                                                • lstrlenW.KERNEL32(0046E220,00445D80,?,00000000,00404FD5,00445D80,00000000,00424576,74DF23A0,00000000), ref: 00406A73
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                • String ID: F$ F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                • API String ID: 3581403547-1792361021
                                                                • Opcode ID: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                • Instruction ID: 94ababd57b57874809535cfc920d07d17cc92350817822ff6505e5e4c02fddf3
                                                                • Opcode Fuzzy Hash: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                • Instruction Fuzzy Hash: 9E71D6B1A00112ABDF20AF69CC44A7A3775AB55314F12C13BE907B66E0E73C89A1DB59
                                                                APIs
                                                                • CoCreateInstance.OLE32(0040AC30,?,00000001,0040AC10,?), ref: 0040257E
                                                                Strings
                                                                • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: CreateInstance
                                                                • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                • API String ID: 542301482-1377821865
                                                                • Opcode ID: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                • Instruction ID: 17e7a05f0d3b91d3be5025a92c0a08315d4604efbe7233a371b14ee5b096337f
                                                                • Opcode Fuzzy Hash: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                • Instruction Fuzzy Hash: 9E416E74A00205BFCB04EFA0CC99EAE7B79EF48314B20456AF915EB3D1C679A941CB54
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                • Instruction ID: f621f802e1b16f1afd83cb625a9a5dfb13386b99c5f5a138cca70abed5397206
                                                                • Opcode Fuzzy Hash: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                • Instruction Fuzzy Hash: CEE17A71D04218DFCF14CF94D980AAEBBB1AF45301F1981ABEC55AF286D738AA41CF95
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                • Instruction ID: 563abc6a1943806f9f153a5c0538de096a4a033458f435c3a5efc50f2cd88ab2
                                                                • Opcode Fuzzy Hash: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                • Instruction Fuzzy Hash: 67C16831A042598FCF18CF68C9805ED7BA2FF89314F25862AED56A7384E335BC45CB85
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063EB
                                                                • lstrlenW.KERNEL32(?), ref: 004063F8
                                                                • GetVersionExW.KERNEL32(?), ref: 00406456
                                                                  • Part of subcall function 00406057: CharUpperW.USER32(?,0040642D,?), ref: 0040605D
                                                                • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406495
                                                                • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004064B4
                                                                • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004064BE
                                                                • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004064C9
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00406500
                                                                • GlobalFree.KERNEL32(?), ref: 00406509
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                • API String ID: 20674999-2124804629
                                                                • Opcode ID: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                • Instruction ID: cf04814c2eceeca0522e3a2239a4cfb7588c45c97b625e8eb28f179f7b3afb0e
                                                                • Opcode Fuzzy Hash: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                • Instruction Fuzzy Hash: D3919371900219EBDF119FA4CD88AAEBBB8EF04705F11807AE906F7191DB788E51CF59
                                                                APIs
                                                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404199
                                                                • GetDlgItem.USER32(?,000003E8), ref: 004041AD
                                                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004041CA
                                                                • GetSysColor.USER32(?), ref: 004041DB
                                                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041E9
                                                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041F7
                                                                • lstrlenW.KERNEL32(?), ref: 00404202
                                                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040420F
                                                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040421E
                                                                  • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404150,?), ref: 0040400D
                                                                  • Part of subcall function 00403FF6: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404150,?), ref: 0040401C
                                                                  • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404150,?), ref: 00404030
                                                                • GetDlgItem.USER32(?,0000040A), ref: 00404276
                                                                • SendMessageW.USER32(00000000), ref: 0040427D
                                                                • GetDlgItem.USER32(?,000003E8), ref: 004042AA
                                                                • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042ED
                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 004042FB
                                                                • SetCursor.USER32(00000000), ref: 004042FE
                                                                • ShellExecuteW.SHELL32(0000070B,open,0046E220,00000000,00000000,00000001), ref: 00404313
                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 0040431F
                                                                • SetCursor.USER32(00000000), ref: 00404322
                                                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404351
                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404363
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                • String ID: F$N$open
                                                                • API String ID: 3928313111-1104729357
                                                                • Opcode ID: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                • Instruction ID: b74f7aac3d4bcd21dc7a54326fe4aeb8052e912a1eb6d084c2fa05dc76f75ebb
                                                                • Opcode Fuzzy Hash: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                • Instruction Fuzzy Hash: 5D71B5F1A00209BFDB109F65DD45EAA7B78FB44305F00853AFA05B62E1C778AD91CB99
                                                                APIs
                                                                • lstrcpyW.KERNEL32(00465E20,NUL,?,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AD5
                                                                • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AF4
                                                                • GetShortPathNameW.KERNEL32(000000F1,00465E20,00000400), ref: 00406AFD
                                                                  • Part of subcall function 00405DE2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                  • Part of subcall function 00405DE2: lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                • GetShortPathNameW.KERNEL32(000000F1,0046B478,00000400), ref: 00406B1E
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00465E20,000000FF,00466620,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B47
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0046B478,000000FF,00466C70,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B5F
                                                                • wsprintfA.USER32 ref: 00406B79
                                                                • GetFileSize.KERNEL32(00000000,00000000,0046B478,C0000000,00000004,0046B478,?,?,00000000,000000F1,?), ref: 00406BB1
                                                                • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BC0
                                                                • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BDC
                                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406C0C
                                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00467070,00000000,-0000000A,0040A87C,00000000,[Rename]), ref: 00406C63
                                                                  • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                  • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C77
                                                                • GlobalFree.KERNEL32(00000000), ref: 00406C7E
                                                                • CloseHandle.KERNEL32(?), ref: 00406C88
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                • String ID: ^F$%s=%s$NUL$[Rename]$plF
                                                                • API String ID: 565278875-3368763019
                                                                • Opcode ID: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                • Instruction ID: 187392fb1a539ff374a899d42f74550c270b9899c721d3c7d9f4fe98b52eb23c
                                                                • Opcode Fuzzy Hash: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                • Instruction Fuzzy Hash: F2414B322082197FE7206B61DD4CE6F3E6CDF4A758B12013AF586F21D1D6399C10867E
                                                                APIs
                                                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                • DeleteObject.GDI32(?), ref: 004010F6
                                                                • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                • DrawTextW.USER32(00000000,00476AA0,000000FF,00000010,00000820), ref: 0040115F
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                • DeleteObject.GDI32(?), ref: 0040116E
                                                                • EndPaint.USER32(?,?), ref: 00401177
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                • String ID: F
                                                                • API String ID: 941294808-1304234792
                                                                • Opcode ID: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                • Instruction ID: 3a901b8e11bd10f40e8c3d59bf329074d7a31f92ad936af625f7db958ebfa50f
                                                                • Opcode Fuzzy Hash: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                • Instruction Fuzzy Hash: BF518772800209AFCF05CF95DD459AFBBB9FF45315F00802AF952AA1A1C738EA50DFA4
                                                                APIs
                                                                • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                • lstrlenW.KERNEL32(004140F8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                Strings
                                                                • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                • API String ID: 1641139501-220328614
                                                                • Opcode ID: d135351413aed0fa2e41fb55b591d9c8f09a23be57b10ac43573759c3ccf12cb
                                                                • Instruction ID: c6ff7831871a22410ebf281ca69ba80d881ba5d3dc99c3f31bea2db7712f227d
                                                                • Opcode Fuzzy Hash: d135351413aed0fa2e41fb55b591d9c8f09a23be57b10ac43573759c3ccf12cb
                                                                • Instruction Fuzzy Hash: EE418BB2D00208BFCF11AF91CD46DEEBB7AEF44344F20807AF605761A2D3794A509B69
                                                                APIs
                                                                • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                • GetFileAttributesW.KERNEL32(00476240,?,00000000,00000000,?,?,00406300,00000000), ref: 00406168
                                                                • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,00476240,40000000,00000004), ref: 004061A1
                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00476240,40000000,00000004), ref: 004061AD
                                                                • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),0040A678,?,00000000,00000000,?,?,00406300,00000000), ref: 004061C7
                                                                • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,00406300,00000000), ref: 004061CE
                                                                • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,00406300,00000000,?,?,00406300,00000000), ref: 004061E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                • String ID: @bG$RMDir: RemoveDirectory invalid input("")
                                                                • API String ID: 3734993849-3206598305
                                                                • Opcode ID: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                • Instruction ID: 195d9f7db6fc7c0c2d4377fc833027156c916e626c5a885f84869a8699de3d55
                                                                • Opcode Fuzzy Hash: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                • Instruction Fuzzy Hash: 0121C271500240EBD710ABA8DD88D9B3B6CEB06334B118336F52ABA1E1D7389D85C7AC
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                Strings
                                                                • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                • String ID: created uninstaller: %d, "%s"
                                                                • API String ID: 3294113728-3145124454
                                                                • Opcode ID: 4ef21115088bf02e153ee67726e536285437d58c513b54df1b4c7782176e81a7
                                                                • Instruction ID: bd1c3f70b2adfd396ae192ad3b35d3c6df9fc0ba6a3ee2c413e2f7d1cf6bca0f
                                                                • Opcode Fuzzy Hash: 4ef21115088bf02e153ee67726e536285437d58c513b54df1b4c7782176e81a7
                                                                • Instruction Fuzzy Hash: CF319E72800115ABDB11AFA9CD89DAF7FB9EF08364F10023AF515B61E1C7394E419B98
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                  • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00424576,74DF23A0,00000000), ref: 00404FD6
                                                                  • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00424576,74DF23A0,00000000), ref: 00404FE6
                                                                  • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00424576,74DF23A0,00000000), ref: 00404FF9
                                                                  • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                Strings
                                                                • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                • `G, xrefs: 0040246E
                                                                • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$`G
                                                                • API String ID: 1033533793-4193110038
                                                                • Opcode ID: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                • Instruction ID: ac94b2829880799def153f2ab6d9fb01897d962df66ba524602deb4d09d833fb
                                                                • Opcode Fuzzy Hash: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                • Instruction Fuzzy Hash: AE21A635A00215FBDF20AFA1CE49A9D7E71AB44318F30817BF512761E1D6BD4A80DA5D
                                                                APIs
                                                                • GetWindowLongW.USER32(?,000000EB), ref: 00403E10
                                                                • GetSysColor.USER32(00000000), ref: 00403E2C
                                                                • SetTextColor.GDI32(?,00000000), ref: 00403E38
                                                                • SetBkMode.GDI32(?,?), ref: 00403E44
                                                                • GetSysColor.USER32(?), ref: 00403E57
                                                                • SetBkColor.GDI32(?,?), ref: 00403E67
                                                                • DeleteObject.GDI32(?), ref: 00403E81
                                                                • CreateBrushIndirect.GDI32(?), ref: 00403E8B
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                • String ID:
                                                                • API String ID: 2320649405-0
                                                                • Opcode ID: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                • Instruction ID: 46e75ec11a9703e62b9e59528547c83071966f0b6f932d53464b5ad1ffaeee7a
                                                                • Opcode Fuzzy Hash: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                • Instruction Fuzzy Hash: CA116371500744ABCB219F78DD08B5BBFF8AF40715F048A2AE895E22A1D738DA44CB94
                                                                APIs
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                  • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,00424576,74DF23A0,00000000), ref: 00404FD6
                                                                  • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,00424576,74DF23A0,00000000), ref: 00404FE6
                                                                  • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,00424576,74DF23A0,00000000), ref: 00404FF9
                                                                  • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                  • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                  • Part of subcall function 00405C6B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                  • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                Strings
                                                                • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                • Exec: command="%s", xrefs: 00402241
                                                                • Exec: success ("%s"), xrefs: 00402263
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                • API String ID: 2014279497-3433828417
                                                                • Opcode ID: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                • Instruction ID: 042007ee205ef60e30064d08c60082207347e2967af2fac5581f577c4c1081ae
                                                                • Opcode Fuzzy Hash: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                • Instruction Fuzzy Hash: 4E11A332504115EBDB01BFE1DE49AAE3A62EF04324B24807FF502B51D2C7BD4D51DA9D
                                                                APIs
                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404895
                                                                • GetMessagePos.USER32 ref: 0040489D
                                                                • ScreenToClient.USER32(?,?), ref: 004048B5
                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 004048C7
                                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048ED
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Message$Send$ClientScreen
                                                                • String ID: f
                                                                • API String ID: 41195575-1993550816
                                                                • Opcode ID: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                • Instruction ID: ebefa7930bdcd0e41c689069c6d494cf412fee4c497549fa98469d3d4217857c
                                                                • Opcode Fuzzy Hash: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                • Instruction Fuzzy Hash: 7A019E72A00219BAEB00DB94CC85BEEBBB8AF44710F10412ABB10B61D0C3B45A058BA4
                                                                APIs
                                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                • MulDiv.KERNEL32(00028A00,00000064,0460262C), ref: 00403295
                                                                • wsprintfW.USER32 ref: 004032A5
                                                                • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                Strings
                                                                • verifying installer: %d%%, xrefs: 0040329F
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Text$ItemTimerWindowwsprintf
                                                                • String ID: verifying installer: %d%%
                                                                • API String ID: 1451636040-82062127
                                                                • Opcode ID: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                • Instruction ID: b5f4dff99bd495ec87a9693a0662ffae913500554fa258d9a040327637eece45
                                                                • Opcode Fuzzy Hash: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                • Instruction Fuzzy Hash: F8014470640109BBEF109F60DC4AFEE3B68AB00309F008439FA05E51E1DB789A55CF58
                                                                APIs
                                                                • CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                • CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                • CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                • CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Char$Next$Prev
                                                                • String ID: *?|<>/":
                                                                • API String ID: 589700163-165019052
                                                                • Opcode ID: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                • Instruction ID: be175804d259169a812840791ea7ca7df426672d81dd27f3292f2fdf866f60ab
                                                                • Opcode Fuzzy Hash: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                • Instruction Fuzzy Hash: E311C81188022159DB30FB698C4497776F8AE55750716843FE9CAF32C1E7BCDC9182BD
                                                                APIs
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Close$DeleteEnumOpen
                                                                • String ID:
                                                                • API String ID: 1912718029-0
                                                                • Opcode ID: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                • Instruction ID: c67b0bc93acae55c3864b02ebd95f02f7c15995ce12be8144693d1f813214158
                                                                • Opcode Fuzzy Hash: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                • Instruction Fuzzy Hash: EB117976500008FFDF119F90ED859AA3B7AFB84348F004476FA0AB5070D3358E509A29
                                                                APIs
                                                                • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                • VerQueryValueW.VERSION(?,00409838,?,?,?,?,?,00000000), ref: 00402360
                                                                  • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                • GlobalFree.KERNEL32(0092DF88), ref: 00402387
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                • String ID:
                                                                • API String ID: 3376005127-0
                                                                • Opcode ID: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                • Instruction ID: 214764af72b390ffa64cdeb44d1c6cd0e8ca06a9e3a7070d0c65f9f565939ffa
                                                                • Opcode Fuzzy Hash: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                • Instruction Fuzzy Hash: 0D112572A0010AAFDF00EFA1D9459AEBBB8EF08344B10447AF606F61A1D7798A40CB18
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                • WideCharToMultiByte.KERNEL32(?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                • lstrlenA.KERNEL32(?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                • String ID:
                                                                • API String ID: 2568930968-0
                                                                • Opcode ID: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                • Instruction ID: eb70b36e00a6049791e454e439637436730f967712bedb277b0d85a94317bb29
                                                                • Opcode Fuzzy Hash: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                • Instruction Fuzzy Hash: 7F016171600205FFEB14AF60DD4CE9E3B78EB05359F10443AF606B91E2D6799D81DB68
                                                                APIs
                                                                • GetDlgItem.USER32(?), ref: 004020A3
                                                                • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                • String ID:
                                                                • API String ID: 1849352358-0
                                                                • Opcode ID: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                • Instruction ID: 8f71947f799b2f64a69df86d2a8dcb393400c967cd863db52f2ee5b4f8782dab
                                                                • Opcode Fuzzy Hash: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                • Instruction Fuzzy Hash: 9DF012B2A00104BFE700EBA4EE89DEFBBBCEB04305B104575F502F6162C6759E418B28
                                                                APIs
                                                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Timeout
                                                                • String ID: !
                                                                • API String ID: 1777923405-2657877971
                                                                • Opcode ID: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                • Instruction ID: 6a5c1514d43e21eed083d94b15ba6593763dc9af2b3e6337d8774d5f4809249f
                                                                • Opcode Fuzzy Hash: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                • Instruction Fuzzy Hash: 56217171900209BADF15AFB4D886ABE7BB9EF04349F10413EF602F60E2D6794A40D758
                                                                APIs
                                                                • lstrlenW.KERNEL32(00451D98,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00451D98,?), ref: 00404476
                                                                • wsprintfW.USER32 ref: 00404483
                                                                • SetDlgItemTextW.USER32(?,00451D98,000000DF), ref: 00404496
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: ItemTextlstrlenwsprintf
                                                                • String ID: %u.%u%s%s
                                                                • API String ID: 3540041739-3551169577
                                                                • Opcode ID: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                • Instruction ID: 019992b557dc20c415266b5889428492ee6a52d86c3b4952972254649920ef77
                                                                • Opcode Fuzzy Hash: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                • Instruction Fuzzy Hash: DC11527270021477CF10AA699D45F9E765EEBC5334F10423BF519F31E1D6388A158259
                                                                APIs
                                                                  • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                Strings
                                                                • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                • API String ID: 1697273262-1764544995
                                                                • Opcode ID: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                • Instruction ID: 70287f52249eeba914cab3bee2f8f529b2cd5257afac1a85b0186071c419a2a5
                                                                • Opcode Fuzzy Hash: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                • Instruction Fuzzy Hash: 2511E732E00200ABDB10FFA5DD4AABE3A64EF40354F10403FF50AB61D2D6798E50C6AD
                                                                APIs
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                  • Part of subcall function 00406301: FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                  • Part of subcall function 00406301: FindClose.KERNEL32(00000000), ref: 00406318
                                                                • lstrlenW.KERNEL32 ref: 004026B4
                                                                • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                • String ID: CopyFiles "%s"->"%s"
                                                                • API String ID: 2577523808-3778932970
                                                                • Opcode ID: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                • Instruction ID: 7c1d43f40acf3f33c375e3424532232737b5c7d4dc38a4161669d523a66d0fcf
                                                                • Opcode Fuzzy Hash: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                • Instruction Fuzzy Hash: 8A114F71D00214AADB10FFF6984699FBBBCAF44354B10843BA502F72D2E67989418759
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: lstrcatwsprintf
                                                                • String ID: %02x%c$...
                                                                • API String ID: 3065427908-1057055748
                                                                • Opcode ID: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                • Instruction ID: 9bf571533c0fd83e5fe1ff618cfd19ea7d9613251e6e948213dceada22d50e27
                                                                • Opcode Fuzzy Hash: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                • Instruction Fuzzy Hash: E201D272510219BFCB01DF98CC44A9EBBB9EF84714F20817AF806F3280D2799EA48794
                                                                APIs
                                                                • OleInitialize.OLE32(00000000), ref: 00405083
                                                                  • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                • OleUninitialize.OLE32(00000404,00000000), ref: 004050D1
                                                                  • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                  • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                • String ID: Section: "%s"$Skipping section: "%s"
                                                                • API String ID: 2266616436-4211696005
                                                                • Opcode ID: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                • Instruction ID: 3a4ae3dd184d198318ece42e1af7a5bc75ccdc2bd7a030bb5b2a43e0dda7b67b
                                                                • Opcode Fuzzy Hash: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                • Instruction Fuzzy Hash: 0EF0F433504300ABE7106766AC02B1A7BA0EF84724F25017FFA09721E2DB7928418EAD
                                                                APIs
                                                                • GetDC.USER32(?), ref: 00402100
                                                                • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                  • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,00424576,74DF23A0,00000000), ref: 00406902
                                                                • CreateFontIndirectW.GDI32(00420110), ref: 0040216A
                                                                  • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                • String ID:
                                                                • API String ID: 1599320355-0
                                                                • Opcode ID: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                • Instruction ID: 0ba792ce9c48b24537a9dfec97a4105c0a721b5be590283e64661935fd66df2d
                                                                • Opcode Fuzzy Hash: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                • Instruction Fuzzy Hash: B6018872B042509FF7119BB4BC4ABAA7BE4A715315F504436F141F61E3CA7D4411C72D
                                                                APIs
                                                                  • Part of subcall function 00406EFE: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407265
                                                                • lstrcmpW.KERNEL32(?,Version ), ref: 00407276
                                                                • lstrcpynW.KERNEL32(?,?,?), ref: 0040728D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: lstrcpyn$CreateFilelstrcmp
                                                                • String ID: Version
                                                                • API String ID: 512980652-315105994
                                                                • Opcode ID: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                • Instruction ID: f6016284c167eb8c93e4c4d2cd91337f160ffdcdaea293fd9af5b6974d265005
                                                                • Opcode Fuzzy Hash: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                • Instruction Fuzzy Hash: 74F08172A0021CBBDF109BA5DD45EEA777CAB44700F000076F600F6191E2B5AE148BA1
                                                                APIs
                                                                • DestroyWindow.USER32(00000000,00000000,0040372F,00000001,?,?,?,00000000,00403A73,?), ref: 004032E5
                                                                • GetTickCount.KERNEL32 ref: 00403303
                                                                • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A73,?), ref: 0040332E
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                • String ID:
                                                                • API String ID: 2102729457-0
                                                                • Opcode ID: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                • Instruction ID: 7080548a0c715e844c944b711630a30770084a0de0adb1936a850f0acfbe0ad2
                                                                • Opcode Fuzzy Hash: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                • Instruction Fuzzy Hash: 76F05E30541220BBC620AF24FD89AAF7F68B705B1274008BAF405B11A6C7384D92CFDC
                                                                APIs
                                                                • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 0040639C
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004063B2
                                                                • GetProcAddress.KERNEL32(?,00000000), ref: 004063C1
                                                                • GlobalFree.KERNEL32(00000000), ref: 004063CA
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                • String ID:
                                                                • API String ID: 2883127279-0
                                                                • Opcode ID: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                • Instruction ID: 23858f5f5f858bd20c6f81bae205610dc5c3869b82bfcacec746ad73dc06cfd6
                                                                • Opcode Fuzzy Hash: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                • Instruction Fuzzy Hash: 82E092313001117BF2101B269D8CD677EACDBCA7B2B05013AF645E11E1C6308C10C674
                                                                APIs
                                                                • IsWindowVisible.USER32(?), ref: 0040492E
                                                                • CallWindowProcW.USER32(?,00000200,?,?), ref: 0040499C
                                                                  • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: Window$CallMessageProcSendVisible
                                                                • String ID:
                                                                • API String ID: 3748168415-3916222277
                                                                • Opcode ID: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                • Instruction ID: 3c1fd1ddb59456d7d2ea24cd553691e7f5dd8d926ac1a383129e0726a186868e
                                                                • Opcode Fuzzy Hash: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                • Instruction Fuzzy Hash: CE118FF1500209ABDF115F65DC44EAB776CAF84365F00803BFA04761A2C37D8D919FA9
                                                                APIs
                                                                • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfileStringlstrcmp
                                                                • String ID: !N~
                                                                • API String ID: 623250636-529124213
                                                                • Opcode ID: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                • Instruction ID: 1025b72e91f13a3121db677028adcce723ab2f3f19a12cbdb86f5280e69f3e4e
                                                                • Opcode Fuzzy Hash: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                • Instruction Fuzzy Hash: 14E0C0716002086AEB01ABA1DD89DAE7BACAB45304F144426F601F71E3E6745D028714
                                                                APIs
                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                • CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                Strings
                                                                • Error launching installer, xrefs: 00405C74
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateHandleProcess
                                                                • String ID: Error launching installer
                                                                • API String ID: 3712363035-66219284
                                                                • Opcode ID: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                • Instruction ID: 058e85fc593d498414a6a643ff83d14e048665682532f700ab3f6144ed6d8858
                                                                • Opcode Fuzzy Hash: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                • Instruction Fuzzy Hash: A4E0ECB0900209AFEB009F65DD09E7B7BBCEB00384F084426AD10E2161E778D8148B69
                                                                APIs
                                                                • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                • wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                  • Part of subcall function 00406113: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: CloseHandlelstrlenwvsprintf
                                                                • String ID: RMDir: RemoveDirectory invalid input("")
                                                                • API String ID: 3509786178-2769509956
                                                                • Opcode ID: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                • Instruction ID: 2c5812d3804eb93f93713fa8b891b4ce654538dc852139f9e16b4ff69120e8c2
                                                                • Opcode Fuzzy Hash: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                • Instruction Fuzzy Hash: 93D05E34A50206BADA009FE1FE29E597764AB84304F400869F005890B1EA74C4108B0E
                                                                APIs
                                                                • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                • lstrcmpiA.KERNEL32(?,?), ref: 00405E0A
                                                                • CharNextA.USER32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E1B
                                                                • lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                Memory Dump Source
                                                                • Source File: 00000000.00000002.1684798498.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 00000000.00000002.1684786690.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684813471.0000000000409000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000420000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684825730.000000000046B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                • Associated: 00000000.00000002.1684907816.0000000000500000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_0_2_400000_Setup.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$CharNextlstrcmpi
                                                                • String ID:
                                                                • API String ID: 190613189-0
                                                                • Opcode ID: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                • Instruction ID: 6c750b41c95b6ea6b2c0dd9449a28e86abc919c298eb75f697d1220529daba74
                                                                • Opcode Fuzzy Hash: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                • Instruction Fuzzy Hash: 95F0CD31205558FFCB019FA9DC0499FBBA8EF5A350B2544AAE840E7321D234DE019BA4

                                                                Execution Graph

                                                                Execution Coverage:4.1%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:2.5%
                                                                Total number of Nodes:2000
                                                                Total number of Limit Nodes:109
                                                                execution_graph 98003 a2e463 98015 9f373a 98003->98015 98005 a2e479 98006 a2e4fa 98005->98006 98007 a2e48f 98005->98007 98024 9fb020 98006->98024 98066 9f5376 60 API calls 98007->98066 98011 a2e4ce 98014 a2e4ee Mailbox 98011->98014 98067 a5890a 59 API calls Mailbox 98011->98067 98012 a2f046 Mailbox 98014->98012 98068 a5a48d 89 API calls 4 library calls 98014->98068 98016 9f3758 98015->98016 98017 9f3746 98015->98017 98019 9f375e 98016->98019 98020 9f3787 98016->98020 98069 9f523c 98017->98069 98073 a10fe6 98019->98073 98022 9f523c 59 API calls 98020->98022 98023 9f3750 98022->98023 98023->98005 98119 a03740 98024->98119 98026 9fbb86 98222 a5a48d 89 API calls 4 library calls 98026->98222 98027 a330b6 98223 a5a48d 89 API calls 4 library calls 98027->98223 98029 9fb07f 98029->98026 98029->98027 98031 a330d4 98029->98031 98062 9fb132 Mailbox _memmove 98029->98062 98224 a5a48d 89 API calls 4 library calls 98031->98224 98033 a3355e 98065 9fb4dd 98033->98065 98267 a5a48d 89 API calls 4 library calls 98033->98267 98035 a3318a 98035->98065 98226 a5a48d 89 API calls 4 library calls 98035->98226 98039 a33106 98039->98035 98225 9fa9de 274 API calls 98039->98225 98042 9f3b31 59 API calls 98042->98062 98043 9f53b0 274 API calls 98043->98062 98044 a4730a 59 API calls 98044->98062 98047 a33418 98233 9f53b0 98047->98233 98050 a33448 98050->98065 98261 9f39be 98050->98261 98054 9f3c30 68 API calls 98054->98062 98055 a331c3 98227 a5a48d 89 API calls 4 library calls 98055->98227 98056 a3346f 98265 a5a48d 89 API calls 4 library calls 98056->98265 98060 9f523c 59 API calls 98060->98062 98061 a01c9c 59 API calls 98061->98062 98062->98026 98062->98033 98062->98039 98062->98042 98062->98043 98062->98044 98062->98047 98062->98054 98062->98055 98062->98056 98062->98060 98062->98061 98064 a10fe6 59 API calls Mailbox 98062->98064 98062->98065 98124 9f3add 98062->98124 98131 9fbc70 98062->98131 98210 9f3a40 98062->98210 98221 9f5190 59 API calls Mailbox 98062->98221 98228 a46c62 59 API calls 2 library calls 98062->98228 98229 a6a9c3 85 API calls Mailbox 98062->98229 98230 a46c1e 59 API calls Mailbox 98062->98230 98231 a55ef2 68 API calls 98062->98231 98232 9f3ea3 68 API calls Mailbox 98062->98232 98266 a5a12a 59 API calls 98062->98266 98064->98062 98065->98014 98066->98011 98067->98014 98068->98012 98070 9f524a 98069->98070 98072 9f5250 98069->98072 98070->98072 98083 a01c9c 98070->98083 98072->98023 98076 a10fee 98073->98076 98075 a11008 98075->98023 98076->98075 98078 a1100c std::exception::exception 98076->98078 98091 a1593c 98076->98091 98108 a135d1 DecodePointer 98076->98108 98109 a187cb RaiseException 98078->98109 98080 a11036 98110 a18701 58 API calls _free 98080->98110 98082 a11048 98082->98023 98084 a01ca7 98083->98084 98085 a01caf 98083->98085 98087 a01bcc 98084->98087 98085->98072 98088 a01bef _memmove 98087->98088 98089 a01bdc 98087->98089 98088->98085 98089->98088 98090 a10fe6 Mailbox 59 API calls 98089->98090 98090->98088 98092 a159b7 98091->98092 98105 a15948 98091->98105 98117 a135d1 DecodePointer 98092->98117 98094 a159bd 98118 a18d58 58 API calls __getptd_noexit 98094->98118 98097 a1597b RtlAllocateHeap 98097->98105 98107 a159af 98097->98107 98099 a159a3 98115 a18d58 58 API calls __getptd_noexit 98099->98115 98103 a159a1 98116 a18d58 58 API calls __getptd_noexit 98103->98116 98104 a15953 98104->98105 98111 a1a39b 58 API calls __NMSG_WRITE 98104->98111 98112 a1a3f8 58 API calls 6 library calls 98104->98112 98113 a132cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98104->98113 98105->98097 98105->98099 98105->98103 98105->98104 98114 a135d1 DecodePointer 98105->98114 98107->98076 98108->98076 98109->98080 98110->98082 98111->98104 98112->98104 98114->98105 98115->98103 98116->98107 98117->98094 98118->98107 98120 a0374f 98119->98120 98123 a0376a 98119->98123 98268 a01aa4 98120->98268 98122 a03757 CharUpperBuffW 98122->98123 98123->98029 98125 9f3aee 98124->98125 98126 a2d3cd 98124->98126 98127 a10fe6 Mailbox 59 API calls 98125->98127 98128 9f3af5 98127->98128 98129 9f3b16 98128->98129 98272 9f3ba5 59 API calls Mailbox 98128->98272 98129->98062 98132 a3359f 98131->98132 98144 9fbc95 98131->98144 98365 a5a48d 89 API calls 4 library calls 98132->98365 98134 9fbf3b 98134->98062 98138 9fc2b6 98138->98134 98139 9fc2c3 98138->98139 98363 9fc483 274 API calls Mailbox 98139->98363 98140 9fbf25 Mailbox 98140->98134 98362 9fc460 10 API calls Mailbox 98140->98362 98143 9fc2ca LockWindowUpdate DestroyWindow GetMessageW 98143->98134 98145 9fc2fc 98143->98145 98171 9fbca5 Mailbox 98144->98171 98366 9f5376 60 API calls 98144->98366 98367 a4700c 274 API calls 98144->98367 98147 a34509 TranslateMessage DispatchMessageW GetMessageW 98145->98147 98146 a336b3 Sleep 98146->98171 98147->98147 98148 a34539 98147->98148 98148->98134 98149 9f5376 60 API calls 98149->98171 98150 a3405d WaitForSingleObject 98153 a3407d GetExitCodeProcess CloseHandle 98150->98153 98150->98171 98151 9fbf54 timeGetTime 98151->98171 98174 9fc36b 98153->98174 98154 9fc210 Sleep 98177 9fc1fa Mailbox 98154->98177 98155 a01c9c 59 API calls 98155->98171 98157 a343a9 Sleep 98157->98177 98158 a10fe6 59 API calls Mailbox 98158->98171 98161 9fc324 timeGetTime 98364 9f5376 60 API calls 98161->98364 98162 a10859 timeGetTime 98162->98177 98165 a34440 GetExitCodeProcess 98167 a34456 WaitForSingleObject 98165->98167 98168 a3446c CloseHandle 98165->98168 98167->98168 98167->98171 98168->98177 98169 a76562 110 API calls 98169->98177 98171->98140 98171->98146 98171->98149 98171->98150 98171->98151 98171->98154 98171->98155 98171->98157 98171->98158 98171->98161 98172 9f6d79 109 API calls 98171->98172 98171->98174 98171->98177 98185 9fc26d 98171->98185 98186 9fb020 252 API calls 98171->98186 98189 a5a48d 89 API calls 98171->98189 98191 a01a36 59 API calls 98171->98191 98194 9f3ea3 68 API calls 98171->98194 98195 9f6cd8 252 API calls 98171->98195 98196 9f53b0 252 API calls 98171->98196 98197 9f39be 68 API calls 98171->98197 98198 9f3a40 59 API calls 98171->98198 98199 a46cf1 59 API calls Mailbox 98171->98199 98200 a33e13 VariantClear 98171->98200 98201 a33ea9 VariantClear 98171->98201 98202 a33c57 VariantClear 98171->98202 98203 9f41c4 59 API calls Mailbox 98171->98203 98204 a47aad 59 API calls 98171->98204 98205 9f5190 59 API calls Mailbox 98171->98205 98273 9f52b0 98171->98273 98282 9f9a00 98171->98282 98289 9f9c80 98171->98289 98320 9fa820 98171->98320 98337 a6e620 98171->98337 98340 a5c270 98171->98340 98347 a6eedb 98171->98347 98355 a6e60c 98171->98355 98368 a76655 59 API calls 98171->98368 98369 a5a058 59 API calls Mailbox 98171->98369 98370 a4e0aa 59 API calls 98171->98370 98371 9f4d37 98171->98371 98389 a46c62 59 API calls 2 library calls 98171->98389 98390 9f38ff 59 API calls 98171->98390 98400 a6c355 98171->98400 98172->98171 98174->98062 98175 a338aa Sleep 98175->98171 98176 a344c8 Sleep 98176->98171 98177->98154 98177->98162 98177->98165 98177->98169 98177->98171 98177->98174 98177->98175 98177->98176 98180 a01a36 59 API calls 98177->98180 98391 a01207 98177->98391 98396 a52baf 60 API calls 98177->98396 98397 9f5376 60 API calls 98177->98397 98398 9f3ea3 68 API calls Mailbox 98177->98398 98399 9f6cd8 274 API calls 98177->98399 98440 a470e2 59 API calls 98177->98440 98441 a557ff QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98177->98441 98442 a54148 CreateToolhelp32Snapshot Process32FirstW 98177->98442 98180->98177 98358 a01a36 98185->98358 98186->98171 98189->98171 98191->98171 98194->98171 98195->98171 98196->98171 98197->98171 98198->98171 98199->98171 98200->98171 98201->98171 98202->98171 98203->98171 98204->98171 98205->98171 98211 a2d3b1 98210->98211 98212 9f3a53 98210->98212 98213 a2d3c1 98211->98213 99128 a46d17 59 API calls 98211->99128 98214 9f3a9a Mailbox 98212->98214 98216 9f3a7d 98212->98216 98218 9f3b31 59 API calls 98212->98218 98214->98062 98217 9f3a83 98216->98217 99119 9f3b31 98216->99119 98217->98214 99127 9f5190 59 API calls Mailbox 98217->99127 98218->98216 98221->98062 98222->98027 98223->98065 98224->98065 98225->98035 98226->98065 98227->98065 98228->98062 98229->98062 98230->98062 98231->98062 98232->98062 98234 9f53cf 98233->98234 98257 9f53fd Mailbox 98233->98257 98235 a10fe6 Mailbox 59 API calls 98234->98235 98235->98257 98236 9f69ff 98239 a2e691 98236->98239 98240 a2f165 98236->98240 98237 9f69fa 98238 a01c9c 59 API calls 98237->98238 98255 9f5569 Mailbox 98238->98255 99206 a5a48d 89 API calls 4 library calls 98239->99206 99210 a5a48d 89 API calls 4 library calls 98240->99210 98241 a01207 59 API calls 98241->98257 98245 a2e6a0 98245->98050 98246 a10fe6 59 API calls Mailbox 98246->98257 98248 a2ea9a 98251 a01c9c 59 API calls 98248->98251 98249 a01c9c 59 API calls 98249->98257 98251->98255 98252 a47aad 59 API calls 98252->98257 98253 a2eb67 98253->98255 99207 a47aad 59 API calls 98253->99207 98254 a12f70 67 API calls __cinit 98254->98257 98255->98050 98257->98236 98257->98237 98257->98239 98257->98241 98257->98246 98257->98248 98257->98249 98257->98252 98257->98253 98257->98254 98257->98255 98258 a2ef28 98257->98258 98260 9f5a1a 98257->98260 99130 9f7e50 98257->99130 99189 9f6e30 98257->99189 99208 a5a48d 89 API calls 4 library calls 98258->99208 99209 a5a48d 89 API calls 4 library calls 98260->99209 98262 9f39c9 98261->98262 98264 9f39f0 98262->98264 99229 9f3ea3 68 API calls Mailbox 98262->99229 98264->98056 98265->98065 98266->98062 98267->98065 98269 a01ab7 98268->98269 98271 a01ab4 _memmove 98268->98271 98270 a10fe6 Mailbox 59 API calls 98269->98270 98270->98271 98271->98122 98272->98129 98274 9f52c6 98273->98274 98275 9f5313 98273->98275 98274->98275 98276 9f52d3 PeekMessageW 98274->98276 98277 9f52ec 98275->98277 98279 a2df68 TranslateAcceleratorW 98275->98279 98280 9f533e PeekMessageW 98275->98280 98281 9f5352 TranslateMessage DispatchMessageW 98275->98281 98452 9f359e 98275->98452 98276->98275 98276->98277 98277->98171 98279->98275 98279->98280 98280->98275 98280->98277 98281->98280 98283 9f9a1d 98282->98283 98284 9f9a31 98282->98284 98457 9f94e0 98283->98457 98491 a5a48d 89 API calls 4 library calls 98284->98491 98286 9f9a28 98286->98171 98288 a32478 98288->98288 98290 9f9cb5 98289->98290 98291 a3247d 98290->98291 98294 9f9d1f 98290->98294 98298 9f9d79 98290->98298 98292 9f53b0 274 API calls 98291->98292 98293 a32492 98292->98293 98316 9f9f50 Mailbox 98293->98316 98508 a5a48d 89 API calls 4 library calls 98293->98508 98297 a01207 59 API calls 98294->98297 98294->98298 98295 a01207 59 API calls 98295->98298 98299 a324d8 98297->98299 98298->98295 98300 a12f70 __cinit 67 API calls 98298->98300 98302 a324fa 98298->98302 98305 9f9f3a 98298->98305 98298->98316 98509 a12f70 98299->98509 98300->98298 98302->98171 98303 9f39be 68 API calls 98303->98316 98305->98316 98512 a5a48d 89 API calls 4 library calls 98305->98512 98306 9f4230 59 API calls 98306->98316 98308 9f53b0 274 API calls 98308->98316 98309 9fa775 98516 a5a48d 89 API calls 4 library calls 98309->98516 98312 a327f9 98312->98171 98315 a5a48d 89 API calls 98315->98316 98316->98303 98316->98306 98316->98308 98316->98309 98316->98315 98317 a01bcc 59 API calls 98316->98317 98319 9fa058 98316->98319 98513 a47aad 59 API calls 98316->98513 98514 a6ccac 274 API calls 98316->98514 98515 a6bc26 274 API calls Mailbox 98316->98515 98517 9f5190 59 API calls Mailbox 98316->98517 98518 a69ab0 274 API calls Mailbox 98316->98518 98317->98316 98319->98171 98321 a32d51 98320->98321 98324 9fa84c 98320->98324 98598 a5a48d 89 API calls 4 library calls 98321->98598 98323 a32d62 98323->98171 98325 a32d6a 98324->98325 98333 9fa888 _memmove 98324->98333 98599 a5a48d 89 API calls 4 library calls 98325->98599 98328 a10fe6 59 API calls Mailbox 98328->98333 98329 a32dae 98600 9fa9de 274 API calls 98329->98600 98331 9f53b0 274 API calls 98331->98333 98332 a32dc8 98334 9fa975 98332->98334 98601 a5a48d 89 API calls 4 library calls 98332->98601 98333->98328 98333->98329 98333->98331 98333->98332 98333->98334 98335 9fa962 98333->98335 98334->98171 98335->98334 98597 a6a9c3 85 API calls Mailbox 98335->98597 98602 a6d1c6 98337->98602 98339 a6e630 98339->98171 98341 9f4d37 84 API calls 98340->98341 98342 a5c286 98341->98342 98736 a54005 98342->98736 98344 a5c28e 98345 a5c292 GetLastError 98344->98345 98346 a5c2a7 98344->98346 98345->98346 98346->98171 98349 a6ef1e 98347->98349 98354 a6eef7 98347->98354 98348 a6ef40 98352 a6ef84 98348->98352 98348->98354 98909 9f502b 59 API calls 98348->98909 98349->98348 98908 9f502b 59 API calls 98349->98908 98875 a56818 98352->98875 98354->98171 98356 a6d1c6 130 API calls 98355->98356 98357 a6e61c 98356->98357 98357->98171 98359 a01a45 __NMSG_WRITE _memmove 98358->98359 98360 a10fe6 Mailbox 59 API calls 98359->98360 98361 a01a83 98360->98361 98361->98140 98362->98138 98363->98143 98364->98171 98365->98144 98366->98144 98367->98144 98368->98171 98369->98171 98370->98171 98372 9f4d51 98371->98372 98380 9f4d4b 98371->98380 98373 a2db28 __i64tow 98372->98373 98374 9f4d99 98372->98374 98376 9f4d57 __itow 98372->98376 98379 a2da2f 98372->98379 98950 a138c8 83 API calls 3 library calls 98374->98950 98378 a10fe6 Mailbox 59 API calls 98376->98378 98381 9f4d71 98378->98381 98382 a10fe6 Mailbox 59 API calls 98379->98382 98387 a2daa7 Mailbox _wcscpy 98379->98387 98380->98171 98381->98380 98383 a01a36 59 API calls 98381->98383 98384 a2da74 98382->98384 98383->98380 98385 a10fe6 Mailbox 59 API calls 98384->98385 98386 a2da9a 98385->98386 98386->98387 98388 a01a36 59 API calls 98386->98388 98951 a138c8 83 API calls 3 library calls 98387->98951 98388->98387 98389->98171 98390->98171 98392 a10fe6 Mailbox 59 API calls 98391->98392 98393 a01228 98392->98393 98394 a10fe6 Mailbox 59 API calls 98393->98394 98395 a01236 98394->98395 98395->98177 98396->98177 98397->98177 98398->98177 98399->98177 98401 a6c380 98400->98401 98402 a6c39a 98400->98402 98979 a5a48d 89 API calls 4 library calls 98401->98979 98952 a6a8fd 98402->98952 98406 9f53b0 273 API calls 98407 a6c406 98406->98407 98408 a6c392 Mailbox 98407->98408 98409 a6c498 98407->98409 98413 a6c447 98407->98413 98408->98171 98410 a6c4ee 98409->98410 98411 a6c49e 98409->98411 98410->98408 98412 9f4d37 84 API calls 98410->98412 98980 a57ed5 59 API calls 98411->98980 98414 a6c500 98412->98414 98418 a5789a 59 API calls 98413->98418 98416 a01aa4 59 API calls 98414->98416 98419 a6c524 CharUpperBuffW 98416->98419 98417 a6c4c1 98981 a035b9 59 API calls Mailbox 98417->98981 98421 a6c477 98418->98421 98424 a6c53e 98419->98424 98423 a46ebc 273 API calls 98421->98423 98422 a6c4c9 Mailbox 98428 9fb020 273 API calls 98422->98428 98423->98408 98425 a6c591 98424->98425 98427 a6c545 98424->98427 98426 9f4d37 84 API calls 98425->98426 98429 a6c599 98426->98429 98959 a5789a 98427->98959 98428->98408 98982 9f5376 60 API calls 98429->98982 98434 a6c5a3 98434->98408 98435 9f4d37 84 API calls 98434->98435 98436 a6c5be 98435->98436 98983 a035b9 59 API calls Mailbox 98436->98983 98438 a6c5ce 98439 9fb020 273 API calls 98438->98439 98439->98408 98440->98177 98441->98177 99110 a54ce2 98442->99110 98444 a54195 Process32NextW 98445 a54244 CloseHandle 98444->98445 98449 a5418e Mailbox 98444->98449 98445->98177 98446 a01207 59 API calls 98446->98449 98447 a01a36 59 API calls 98447->98449 98448 a10119 59 API calls 98448->98449 98449->98444 98449->98445 98449->98446 98449->98447 98449->98448 98450 a017e0 59 API calls 98449->98450 99116 a0151f 61 API calls 98449->99116 98450->98449 98453 9f35e2 98452->98453 98456 9f35b0 98452->98456 98453->98275 98454 9f35d5 IsDialogMessageW 98454->98453 98454->98456 98455 a2d273 GetClassLongW 98455->98454 98455->98456 98456->98453 98456->98454 98456->98455 98458 9f53b0 274 API calls 98457->98458 98459 9f951f 98458->98459 98460 a32001 98459->98460 98463 9f9527 _memmove 98459->98463 98500 9f5190 59 API calls Mailbox 98460->98500 98462 9f9944 98468 a10fe6 Mailbox 59 API calls 98462->98468 98463->98462 98466 9f9583 98463->98466 98469 a10fe6 59 API calls Mailbox 98463->98469 98474 a322c0 98463->98474 98475 9f96cf 98463->98475 98486 9f9741 98463->98486 98465 a322de 98465->98465 98466->98286 98467 9f986a 98470 9f987f 98467->98470 98471 a322b1 98467->98471 98482 9f96e3 _memmove 98468->98482 98469->98463 98472 a10fe6 Mailbox 59 API calls 98470->98472 98505 a6a983 59 API calls 98471->98505 98481 9f977d 98472->98481 98506 a5a48d 89 API calls 4 library calls 98474->98506 98475->98462 98477 9f96dc 98475->98477 98476 a10fe6 Mailbox 59 API calls 98480 9f970e 98476->98480 98479 a10fe6 Mailbox 59 API calls 98477->98479 98478 a322a0 98504 a5a48d 89 API calls 4 library calls 98478->98504 98479->98482 98480->98486 98492 9fcca0 98480->98492 98481->98286 98482->98476 98482->98480 98482->98486 98486->98467 98486->98478 98486->98481 98487 a32278 98486->98487 98489 a32253 98486->98489 98501 9f8180 274 API calls 98486->98501 98503 a5a48d 89 API calls 4 library calls 98487->98503 98502 a5a48d 89 API calls 4 library calls 98489->98502 98491->98288 98493 9fccda 98492->98493 98494 9fcd02 98492->98494 98495 9f9c80 274 API calls 98493->98495 98496 9fcce0 98493->98496 98494->98496 98497 9f53b0 274 API calls 98494->98497 98498 a34971 98494->98498 98495->98496 98496->98486 98497->98498 98498->98496 98507 a5a48d 89 API calls 4 library calls 98498->98507 98500->98462 98501->98486 98502->98481 98503->98481 98504->98481 98505->98474 98506->98465 98507->98496 98508->98316 98519 a12e74 98509->98519 98511 a12f7b 98511->98298 98512->98316 98513->98316 98514->98316 98515->98316 98516->98312 98517->98316 98518->98316 98520 a12e80 __tzset_nolock 98519->98520 98527 a13447 98520->98527 98526 a12ea7 __tzset_nolock 98526->98511 98544 a19e3b 98527->98544 98529 a12e89 98530 a12eb8 DecodePointer DecodePointer 98529->98530 98531 a12ee5 98530->98531 98532 a12e95 98530->98532 98531->98532 98590 a189d4 59 API calls __Wcsftime_l 98531->98590 98541 a12eb2 98532->98541 98534 a12f48 EncodePointer EncodePointer 98534->98532 98535 a12f1c 98535->98532 98539 a12f36 EncodePointer 98535->98539 98592 a18a94 61 API calls __realloc_crt 98535->98592 98536 a12ef7 98536->98534 98536->98535 98591 a18a94 61 API calls __realloc_crt 98536->98591 98539->98534 98540 a12f30 98540->98532 98540->98539 98593 a13450 98541->98593 98545 a19e4c 98544->98545 98546 a19e5f EnterCriticalSection 98544->98546 98551 a19ec3 98545->98551 98546->98529 98548 a19e52 98548->98546 98575 a132e5 58 API calls 3 library calls 98548->98575 98552 a19ecf __tzset_nolock 98551->98552 98553 a19ef0 98552->98553 98554 a19ed8 98552->98554 98562 a19f11 __tzset_nolock 98553->98562 98579 a18a4d 58 API calls 2 library calls 98553->98579 98576 a1a39b 58 API calls __NMSG_WRITE 98554->98576 98556 a19edd 98577 a1a3f8 58 API calls 6 library calls 98556->98577 98559 a19f05 98560 a19f1b 98559->98560 98561 a19f0c 98559->98561 98565 a19e3b __lock 58 API calls 98560->98565 98580 a18d58 58 API calls __getptd_noexit 98561->98580 98562->98548 98563 a19ee4 98578 a132cf GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 98563->98578 98567 a19f22 98565->98567 98569 a19f47 98567->98569 98570 a19f2f 98567->98570 98582 a12f85 98569->98582 98581 a1a05b InitializeCriticalSectionAndSpinCount 98570->98581 98573 a19f3b 98588 a19f63 LeaveCriticalSection _doexit 98573->98588 98576->98556 98577->98563 98579->98559 98580->98562 98581->98573 98583 a12f8e RtlFreeHeap 98582->98583 98587 a12fb7 _free 98582->98587 98584 a12fa3 98583->98584 98583->98587 98589 a18d58 58 API calls __getptd_noexit 98584->98589 98586 a12fa9 GetLastError 98586->98587 98587->98573 98588->98562 98589->98586 98590->98536 98591->98535 98592->98540 98596 a19fa5 LeaveCriticalSection 98593->98596 98595 a12eb7 98595->98526 98596->98595 98597->98334 98598->98323 98599->98334 98600->98332 98601->98334 98603 9f4d37 84 API calls 98602->98603 98604 a6d203 98603->98604 98628 a6d24a Mailbox 98604->98628 98640 a6de8e 98604->98640 98606 a6d4a2 98607 a6d617 98606->98607 98611 a6d4b0 98606->98611 98690 a6dfb1 92 API calls Mailbox 98607->98690 98610 a6d626 98610->98611 98612 a6d632 98610->98612 98653 a6d057 98611->98653 98612->98628 98613 9f4d37 84 API calls 98632 a6d29b Mailbox 98613->98632 98618 a6d4e9 98668 a10e38 98618->98668 98621 a6d503 98675 a5a48d 89 API calls 4 library calls 98621->98675 98622 a6d51c 98676 9f47be 98622->98676 98625 a6d50e GetCurrentProcess TerminateProcess 98625->98622 98628->98339 98630 a6d565 98633 a6d68d 98630->98633 98639 9f523c 59 API calls 98630->98639 98689 9f4230 59 API calls Mailbox 98630->98689 98691 a6dd32 107 API calls _free 98630->98691 98632->98606 98632->98613 98632->98628 98673 a5fc0d 59 API calls 2 library calls 98632->98673 98674 a6d6c8 61 API calls 2 library calls 98632->98674 98633->98628 98635 a6d6a1 FreeLibrary 98633->98635 98634 a6d554 98688 a6dd32 107 API calls _free 98634->98688 98635->98628 98639->98630 98641 a01aa4 59 API calls 98640->98641 98642 a6dea9 CharLowerBuffW 98641->98642 98692 a4f903 98642->98692 98646 a01207 59 API calls 98647 a6dee2 98646->98647 98699 a01462 98647->98699 98649 a6def9 98712 a01981 98649->98712 98651 a6df05 Mailbox 98652 a6df41 Mailbox 98651->98652 98716 a6d6c8 61 API calls 2 library calls 98651->98716 98652->98632 98654 a6d072 98653->98654 98658 a6d0c7 98653->98658 98655 a10fe6 Mailbox 59 API calls 98654->98655 98657 a6d094 98655->98657 98656 a10fe6 Mailbox 59 API calls 98656->98657 98657->98656 98657->98658 98659 a6e139 98658->98659 98660 a6e362 Mailbox 98659->98660 98666 a6e15c _strcat _wcscpy __NMSG_WRITE 98659->98666 98660->98618 98661 9f5087 59 API calls 98661->98666 98662 9f50d5 59 API calls 98662->98666 98663 9f502b 59 API calls 98663->98666 98664 9f4d37 84 API calls 98664->98666 98665 a1593c 58 API calls std::exception::_Copy_str 98665->98666 98666->98660 98666->98661 98666->98662 98666->98663 98666->98664 98666->98665 98723 a55e42 61 API calls 2 library calls 98666->98723 98669 a10e4d 98668->98669 98670 a10ee5 NtProtectVirtualMemory 98669->98670 98671 a10eb3 98669->98671 98672 a10ed3 CloseHandle 98669->98672 98670->98671 98671->98621 98671->98622 98672->98671 98673->98632 98674->98632 98675->98625 98677 9f47c6 98676->98677 98678 a10fe6 Mailbox 59 API calls 98677->98678 98679 9f47d4 98678->98679 98681 9f47e0 98679->98681 98724 9f46ec 98679->98724 98682 9f4540 98681->98682 98727 9f4650 98682->98727 98684 9f454f 98685 a10fe6 Mailbox 59 API calls 98684->98685 98686 9f45eb 98684->98686 98685->98686 98686->98630 98687 9f4230 59 API calls Mailbox 98686->98687 98687->98634 98688->98630 98689->98630 98690->98610 98691->98630 98693 a4f92e __NMSG_WRITE 98692->98693 98694 a4f96d 98693->98694 98697 a4f963 98693->98697 98698 a4fa14 98693->98698 98694->98646 98694->98651 98697->98694 98717 a014db 61 API calls 98697->98717 98698->98694 98718 a014db 61 API calls 98698->98718 98700 a01471 98699->98700 98701 a014ce 98699->98701 98700->98701 98703 a0147c 98700->98703 98702 a01981 59 API calls 98701->98702 98708 a0149f _memmove 98702->98708 98704 a01497 98703->98704 98705 a3f1de 98703->98705 98719 a01b7c 59 API calls Mailbox 98704->98719 98720 a01c7e 98705->98720 98708->98649 98709 a3f1e8 98710 a10fe6 Mailbox 59 API calls 98709->98710 98711 a3f208 98710->98711 98713 a01998 _memmove 98712->98713 98714 a0198f 98712->98714 98713->98651 98714->98713 98715 a01aa4 59 API calls 98714->98715 98715->98713 98716->98652 98717->98697 98718->98698 98719->98708 98721 a10fe6 Mailbox 59 API calls 98720->98721 98722 a01c88 98721->98722 98722->98709 98723->98666 98725 a10fe6 Mailbox 59 API calls 98724->98725 98726 9f46f9 98725->98726 98726->98681 98728 9f4659 Mailbox 98727->98728 98729 a2d6ec 98728->98729 98733 9f4663 98728->98733 98730 a10fe6 Mailbox 59 API calls 98729->98730 98732 a2d6f8 98730->98732 98731 9f466a 98731->98684 98733->98731 98735 9f5190 59 API calls Mailbox 98733->98735 98735->98733 98737 a01207 59 API calls 98736->98737 98738 a54024 98737->98738 98739 a01207 59 API calls 98738->98739 98740 a5402d 98739->98740 98741 a01207 59 API calls 98740->98741 98742 a54036 98741->98742 98760 a10284 98742->98760 98747 a5405c 98772 a10119 98747->98772 98748 a01900 59 API calls 98748->98747 98750 a54070 FindFirstFileW 98751 a540fc FindClose 98750->98751 98754 a5408f 98750->98754 98757 a54107 Mailbox 98751->98757 98752 a540d7 FindNextFileW 98752->98754 98753 a01c9c 59 API calls 98753->98754 98754->98751 98754->98752 98754->98753 98823 a017e0 98754->98823 98832 a01900 98754->98832 98757->98344 98759 a540f3 FindClose 98759->98757 98839 a21b70 98760->98839 98763 a102b0 98845 a01821 98763->98845 98764 a102cd 98854 a019e1 98764->98854 98767 a102bc 98841 a0133d 98767->98841 98770 a54fec GetFileAttributesW 98771 a5404a 98770->98771 98771->98747 98771->98748 98773 a01207 59 API calls 98772->98773 98774 a1012f 98773->98774 98775 a01207 59 API calls 98774->98775 98776 a10137 98775->98776 98777 a01207 59 API calls 98776->98777 98778 a1013f 98777->98778 98779 a01207 59 API calls 98778->98779 98780 a10147 98779->98780 98781 a4627d 98780->98781 98782 a1017b 98780->98782 98783 a01c9c 59 API calls 98781->98783 98784 a01462 59 API calls 98782->98784 98785 a46286 98783->98785 98786 a10189 98784->98786 98787 a019e1 59 API calls 98785->98787 98788 a01981 59 API calls 98786->98788 98791 a101be 98787->98791 98789 a10193 98788->98789 98789->98791 98792 a01462 59 API calls 98789->98792 98790 a101fe 98793 a01462 59 API calls 98790->98793 98791->98790 98794 a101dd 98791->98794 98804 a462a6 98791->98804 98795 a101b4 98792->98795 98799 a1020f 98793->98799 98859 a01609 98794->98859 98797 a01981 59 API calls 98795->98797 98796 a46376 98800 a01821 59 API calls 98796->98800 98797->98791 98802 a10221 98799->98802 98805 a01c9c 59 API calls 98799->98805 98818 a46333 98800->98818 98803 a10231 98802->98803 98806 a01c9c 59 API calls 98802->98806 98808 a10238 98803->98808 98810 a01c9c 59 API calls 98803->98810 98804->98796 98807 a4635f 98804->98807 98816 a462dd 98804->98816 98805->98802 98806->98803 98807->98796 98812 a4634a 98807->98812 98811 a01c9c 59 API calls 98808->98811 98820 a1023f Mailbox 98808->98820 98809 a01462 59 API calls 98809->98790 98810->98808 98811->98820 98815 a01821 59 API calls 98812->98815 98813 a4633b 98814 a01821 59 API calls 98813->98814 98814->98818 98815->98818 98816->98813 98821 a46326 98816->98821 98817 a01609 59 API calls 98817->98818 98818->98790 98818->98817 98862 a0153b 59 API calls 2 library calls 98818->98862 98820->98750 98822 a01821 59 API calls 98821->98822 98822->98818 98824 a3f401 98823->98824 98825 a017f2 98823->98825 98869 a487f9 59 API calls _memmove 98824->98869 98863 a01680 98825->98863 98828 a017fe 98828->98754 98829 a3f40b 98830 a01c9c 59 API calls 98829->98830 98831 a3f413 Mailbox 98830->98831 98833 a01914 98832->98833 98834 a3f534 98832->98834 98870 a018a5 98833->98870 98836 a01c7e 59 API calls 98834->98836 98838 a3f53f __NMSG_WRITE _memmove 98836->98838 98837 a0191f DeleteFileW 98837->98752 98837->98759 98840 a10291 GetFullPathNameW 98839->98840 98840->98763 98840->98764 98842 a0134b 98841->98842 98843 a01981 59 API calls 98842->98843 98844 a0135b 98843->98844 98844->98770 98846 a0189a 98845->98846 98848 a0182d __NMSG_WRITE 98845->98848 98847 a01981 59 API calls 98846->98847 98853 a0184b _memmove 98847->98853 98849 a01843 98848->98849 98850 a01868 98848->98850 98858 a01b7c 59 API calls Mailbox 98849->98858 98851 a01c7e 59 API calls 98850->98851 98851->98853 98853->98767 98855 a019fb 98854->98855 98857 a019ee 98854->98857 98856 a10fe6 Mailbox 59 API calls 98855->98856 98856->98857 98857->98767 98858->98853 98860 a01aa4 59 API calls 98859->98860 98861 a01614 98860->98861 98861->98790 98861->98809 98862->98818 98864 a01692 98863->98864 98868 a016ba _memmove 98863->98868 98865 a10fe6 Mailbox 59 API calls 98864->98865 98864->98868 98867 a0176f _memmove 98865->98867 98866 a10fe6 Mailbox 59 API calls 98866->98867 98867->98866 98868->98828 98869->98829 98871 a018b4 __NMSG_WRITE 98870->98871 98872 a01c7e 59 API calls 98871->98872 98873 a018c5 _memmove 98871->98873 98874 a3f4f1 _memmove 98872->98874 98873->98837 98910 a56735 98875->98910 98878 a568b1 98880 a56921 98878->98880 98884 a56917 98878->98884 98889 a568ca 98878->98889 98879 a56899 98926 a56a73 89 API calls 2 library calls 98879->98926 98882 a56951 98880->98882 98883 a5699f 98880->98883 98901 a5683d _memmove 98880->98901 98887 a56956 98882->98887 98888 a56971 98882->98888 98885 a569a6 98883->98885 98886 a56a3a 98883->98886 98884->98880 98890 a568fe 98884->98890 98891 a56a1c 98885->98891 98892 a569a9 98885->98892 98886->98901 98935 9f50d5 59 API calls 98886->98935 98887->98901 98930 9f5087 59 API calls 98887->98930 98888->98901 98931 9f5087 59 API calls 98888->98931 98927 a58cd0 61 API calls 98889->98927 98917 a57c7f 98890->98917 98891->98901 98934 9f50d5 59 API calls 98891->98934 98895 a569e5 98892->98895 98896 a569ad 98892->98896 98895->98901 98933 9f50d5 59 API calls 98895->98933 98896->98901 98932 9f50d5 59 API calls 98896->98932 98901->98354 98904 a568d2 98928 a58cd0 61 API calls 98904->98928 98906 a568e9 _memmove 98929 a58cd0 61 API calls 98906->98929 98908->98348 98909->98352 98911 a56785 98910->98911 98915 a56746 98910->98915 98946 9f502b 59 API calls 98911->98946 98913 a56783 98913->98878 98913->98879 98913->98901 98914 9f4d37 84 API calls 98914->98915 98915->98913 98915->98914 98936 a1312d 98915->98936 98918 a57c8a 98917->98918 98919 a10fe6 Mailbox 59 API calls 98918->98919 98920 a57c91 98919->98920 98921 a57c9d 98920->98921 98922 a57cbe 98920->98922 98923 a10fe6 Mailbox 59 API calls 98921->98923 98924 a10fe6 Mailbox 59 API calls 98922->98924 98925 a57ca6 _memset 98923->98925 98924->98925 98925->98901 98926->98901 98927->98904 98928->98906 98929->98890 98930->98901 98931->98901 98932->98901 98933->98901 98934->98901 98935->98901 98937 a131ae 98936->98937 98938 a13139 98936->98938 98949 a131c0 60 API calls 3 library calls 98937->98949 98945 a1315e 98938->98945 98947 a18d58 58 API calls __getptd_noexit 98938->98947 98941 a131bb 98941->98915 98942 a13145 98948 a18fe6 9 API calls __Wcsftime_l 98942->98948 98944 a13150 98944->98915 98945->98915 98946->98913 98947->98942 98948->98944 98949->98941 98950->98376 98951->98373 98953 a6a918 98952->98953 98958 a6a970 98952->98958 98954 a10fe6 Mailbox 59 API calls 98953->98954 98956 a6a93a 98954->98956 98955 a10fe6 Mailbox 59 API calls 98955->98956 98956->98955 98956->98958 98984 a4715b 59 API calls Mailbox 98956->98984 98958->98406 98960 a578e3 98959->98960 98961 a578ac 98959->98961 98963 a46ebc 98960->98963 98961->98960 98962 a10fe6 Mailbox 59 API calls 98961->98962 98962->98960 98964 a46f06 98963->98964 98968 a46f1c Mailbox 98963->98968 98965 a01a36 59 API calls 98964->98965 98965->98968 98966 a46f47 98969 a6c355 274 API calls 98966->98969 98967 a46f5a 98971 9fa820 274 API calls 98967->98971 98968->98966 98968->98967 98970 a46f53 98969->98970 98992 a46cf1 59 API calls Mailbox 98970->98992 98974 a46f91 98971->98974 98973 a47002 98973->98408 98974->98970 98975 a46fdc 98974->98975 98977 a46fc1 98974->98977 98975->98970 98991 a5a48d 89 API calls 4 library calls 98975->98991 98985 a4706d 98977->98985 98979->98408 98980->98417 98981->98422 98982->98434 98983->98438 98984->98956 98986 a47085 98985->98986 98993 9fec83 98986->98993 99068 a6495b 98986->99068 99077 a6f1b2 98986->99077 98987 a470d9 98987->98970 98991->98970 98992->98973 98994 9f4d37 84 API calls 98993->98994 98995 9feca2 98994->98995 98996 9f4d37 84 API calls 98995->98996 98997 9fecb7 98996->98997 98998 9f4d37 84 API calls 98997->98998 98999 9fecca 98998->98999 99000 9f4d37 84 API calls 98999->99000 99001 9fece0 99000->99001 99082 a0162d 99001->99082 99004 9fed19 99006 a35b67 99004->99006 99032 9fed43 __wopenfile 99004->99032 99007 9f47be 59 API calls 99006->99007 99008 a35b7a 99007->99008 99010 9f4540 59 API calls 99008->99010 99009 9f47be 59 API calls 99011 a35d4a 99009->99011 99012 a35b8c 99010->99012 99014 a35d53 99011->99014 99015 a35d97 99011->99015 99019 9f43d0 59 API calls 99012->99019 99044 a35bb1 99012->99044 99013 9f4d37 84 API calls 99016 9fedca 99013->99016 99018 9f4540 59 API calls 99014->99018 99020 9f4540 59 API calls 99015->99020 99021 9f4d37 84 API calls 99016->99021 99017 9fef0c Mailbox 99017->98987 99024 a35d5e 99018->99024 99019->99044 99025 a35da1 99020->99025 99026 9feddf 99021->99026 99023 a35c0f 99035 9f4540 59 API calls 99023->99035 99064 9fef3e 99023->99064 99027 9f4d37 84 API calls 99024->99027 99028 9f43d0 59 API calls 99025->99028 99030 9f47be 59 API calls 99026->99030 99026->99064 99033 a35d70 99027->99033 99029 a35dbd 99028->99029 99041 9f4d37 84 API calls 99029->99041 99034 9fedfe 99030->99034 99031 9f477a 59 API calls 99031->99044 99032->99013 99032->99023 99057 9fee30 __wopenfile 99032->99057 99032->99064 99103 a01364 59 API calls 2 library calls 99033->99103 99034->99023 99037 9fee09 99034->99037 99039 a35c76 99035->99039 99042 9f4540 59 API calls 99037->99042 99038 9f43d0 59 API calls 99038->99044 99045 9f43d0 59 API calls 99039->99045 99040 a35d84 99046 9f477a 59 API calls 99040->99046 99047 a35dd8 99041->99047 99048 9fee18 99042->99048 99044->99017 99044->99031 99044->99038 99101 a01364 59 API calls 2 library calls 99044->99101 99045->99057 99049 a35d92 99046->99049 99104 a01364 59 API calls 2 library calls 99047->99104 99051 a019e1 59 API calls 99048->99051 99054 9f43d0 59 API calls 99049->99054 99051->99057 99053 a35dec 99055 9f477a 59 API calls 99053->99055 99054->99017 99055->99049 99057->99017 99058 a35cc2 99057->99058 99088 a01364 59 API calls 2 library calls 99057->99088 99089 9f477a 99057->99089 99092 9f43d0 99057->99092 99059 a35cfb 99058->99059 99060 a35cec 99058->99060 99061 9f477a 59 API calls 99059->99061 99102 a0153b 59 API calls 2 library calls 99060->99102 99063 a35d09 99061->99063 99065 9f43d0 59 API calls 99063->99065 99064->99009 99066 a35d1c 99065->99066 99067 a019e1 59 API calls 99066->99067 99067->99064 99069 a10fe6 Mailbox 59 API calls 99068->99069 99070 a6496c 99069->99070 99106 a0433f 99070->99106 99073 9f4d37 84 API calls 99074 a6498d GetEnvironmentVariableW 99073->99074 99109 a57a51 59 API calls Mailbox 99074->99109 99076 a649aa 99076->98987 99078 9f4d37 84 API calls 99077->99078 99079 a6f1cf 99078->99079 99080 a54148 66 API calls 99079->99080 99081 a6f1de 99080->99081 99081->98987 99083 a10fe6 Mailbox 59 API calls 99082->99083 99084 a01652 99083->99084 99085 a10fe6 Mailbox 59 API calls 99084->99085 99086 9fecf4 99085->99086 99086->99004 99087 9f502b 59 API calls 99086->99087 99087->99004 99088->99057 99090 a10fe6 Mailbox 59 API calls 99089->99090 99091 9f4787 99090->99091 99091->99057 99093 a2d6c9 99092->99093 99099 9f43e7 99092->99099 99093->99099 99105 9f40cb 59 API calls Mailbox 99093->99105 99095 9f44e8 99097 a10fe6 Mailbox 59 API calls 99095->99097 99096 9f4530 99098 9f523c 59 API calls 99096->99098 99100 9f44ef 99097->99100 99098->99100 99099->99095 99099->99096 99099->99100 99100->99057 99101->99044 99102->99064 99103->99040 99104->99053 99105->99099 99107 a10fe6 Mailbox 59 API calls 99106->99107 99108 a04351 99107->99108 99108->99073 99109->99076 99111 a54d09 99110->99111 99115 a54cf0 99110->99115 99118 a137c3 59 API calls __wcstoi64 99111->99118 99114 a54d0f 99114->98449 99115->99111 99115->99114 99117 a1385c GetStringTypeW _iswctype 99115->99117 99116->98449 99117->99115 99118->99114 99120 9f3b3f 99119->99120 99126 9f3b67 99119->99126 99121 9f3b4d 99120->99121 99123 9f3b31 59 API calls 99120->99123 99122 9f3b53 99121->99122 99124 9f3b31 59 API calls 99121->99124 99122->99126 99129 9f5190 59 API calls Mailbox 99122->99129 99123->99121 99124->99122 99126->98217 99127->98214 99128->98213 99129->99126 99131 9f7e79 99130->99131 99148 9f7ef2 99130->99148 99132 a30adf 99131->99132 99133 9f7e90 99131->99133 99139 a30b09 99131->99139 99217 a6cdc8 274 API calls 2 library calls 99132->99217 99140 a30c37 99133->99140 99149 9f7ea1 99133->99149 99167 9f7eb8 Mailbox 99133->99167 99135 a30ad3 99216 a5a48d 89 API calls 4 library calls 99135->99216 99138 9f53b0 274 API calls 99138->99148 99143 a30b3d 99139->99143 99146 a30b21 99139->99146 99144 a01c9c 59 API calls 99140->99144 99141 a309e1 99214 9f5190 59 API calls Mailbox 99141->99214 99143->99132 99147 a6a8fd 59 API calls 99143->99147 99144->99167 99145 9f806a 99145->98257 99218 a5a48d 89 API calls 4 library calls 99146->99218 99153 a30b53 99147->99153 99148->99138 99148->99141 99148->99145 99163 9f8015 99148->99163 99171 9f7fb2 99148->99171 99187 a309e9 99148->99187 99149->99167 99221 a47aad 59 API calls 99149->99221 99150 a30d0b 99156 a30d41 99150->99156 99223 a6c9c9 95 API calls Mailbox 99150->99223 99152 a30a33 99155 a01c9c 59 API calls 99152->99155 99157 a30bb7 99153->99157 99170 a30b6b 99153->99170 99155->99167 99161 9f523c 59 API calls 99156->99161 99219 a57ed5 59 API calls 99157->99219 99160 a30ce9 99164 9f4d37 84 API calls 99160->99164 99165 9f7ee7 99161->99165 99179 9f8022 Mailbox 99163->99179 99213 a5a48d 89 API calls 4 library calls 99163->99213 99180 a30cf1 __NMSG_WRITE 99164->99180 99165->98257 99166 a30d1f 99169 9f4d37 84 API calls 99166->99169 99167->99150 99167->99165 99222 a6c87c 85 API calls 2 library calls 99167->99222 99181 a30d27 __NMSG_WRITE 99169->99181 99174 a5789a 59 API calls 99170->99174 99171->99163 99211 9f4230 59 API calls Mailbox 99171->99211 99173 a30bc9 99220 a035b9 59 API calls Mailbox 99173->99220 99176 a30b8d 99174->99176 99182 a46ebc 274 API calls 99176->99182 99178 a30bd2 Mailbox 99185 a5789a 59 API calls 99178->99185 99179->99152 99179->99167 99212 a47aad 59 API calls 99179->99212 99180->99150 99183 9f523c 59 API calls 99180->99183 99181->99156 99184 9f523c 59 API calls 99181->99184 99182->99187 99183->99150 99184->99156 99186 a30beb 99185->99186 99188 9fb020 274 API calls 99186->99188 99187->99135 99187->99167 99187->99179 99215 a6ccac 274 API calls 99187->99215 99188->99187 99190 9f6e4a 99189->99190 99192 9f6ff7 99189->99192 99191 9f74d0 99190->99191 99190->99192 99194 9f6f2c 99190->99194 99199 9f6fdb 99190->99199 99191->99199 99228 9f49e0 59 API calls __gmtime64_s 99191->99228 99192->99191 99197 9f7076 99192->99197 99198 9f6fbb Mailbox 99192->99198 99192->99199 99195 9f6f68 99194->99195 99194->99197 99194->99199 99195->99198 99195->99199 99205 a2fa71 99195->99205 99197->99198 99197->99199 99200 a2fc1e 99197->99200 99225 a47aad 59 API calls 99197->99225 99198->99199 99198->99200 99227 9f41c4 59 API calls Mailbox 99198->99227 99199->98257 99199->99199 99202 a2fc30 99200->99202 99226 a13f69 59 API calls __wtof_l 99200->99226 99202->98257 99205->99199 99224 a13f69 59 API calls __wtof_l 99205->99224 99206->98245 99207->98255 99208->98260 99209->98255 99210->98255 99211->99163 99212->99179 99213->99141 99214->99187 99215->99187 99216->99132 99217->99167 99218->99165 99219->99173 99220->99178 99221->99167 99222->99160 99223->99166 99224->99205 99225->99198 99226->99202 99227->99198 99228->99199 99229->98264 99230 a17e83 99231 a17e8f __tzset_nolock 99230->99231 99267 a1a038 GetStartupInfoW 99231->99267 99233 a17e94 99269 a18dac GetProcessHeap 99233->99269 99235 a17eec 99236 a17ef7 99235->99236 99352 a17fd3 58 API calls 3 library calls 99235->99352 99270 a19d16 99236->99270 99239 a17efd 99240 a17f08 __RTC_Initialize 99239->99240 99353 a17fd3 58 API calls 3 library calls 99239->99353 99291 a1d802 99240->99291 99243 a17f17 99244 a17f23 GetCommandLineW 99243->99244 99354 a17fd3 58 API calls 3 library calls 99243->99354 99310 a25153 GetEnvironmentStringsW 99244->99310 99248 a17f22 99248->99244 99250 a17f3d 99251 a17f48 99250->99251 99355 a132e5 58 API calls 3 library calls 99250->99355 99320 a24f88 99251->99320 99254 a17f4e 99258 a17f59 99254->99258 99356 a132e5 58 API calls 3 library calls 99254->99356 99257 a17f61 99259 a17f6c __wwincmdln 99257->99259 99357 a132e5 58 API calls 3 library calls 99257->99357 99334 a1331f 99258->99334 99340 a05f8b 99259->99340 99262 a17f80 99263 a17f8f 99262->99263 99358 a13588 58 API calls _doexit 99262->99358 99359 a13310 58 API calls _doexit 99263->99359 99266 a17f94 __tzset_nolock 99268 a1a04e 99267->99268 99268->99233 99269->99235 99360 a133b7 36 API calls 2 library calls 99270->99360 99272 a19d1b 99361 a19f6c InitializeCriticalSectionAndSpinCount __ioinit 99272->99361 99274 a19d20 99275 a19d24 99274->99275 99363 a19fba TlsAlloc 99274->99363 99362 a19d8c 61 API calls 2 library calls 99275->99362 99278 a19d29 99278->99239 99279 a19d36 99279->99275 99280 a19d41 99279->99280 99364 a18a05 99280->99364 99283 a19d83 99372 a19d8c 61 API calls 2 library calls 99283->99372 99286 a19d62 99286->99283 99288 a19d68 99286->99288 99287 a19d88 99287->99239 99371 a19c63 58 API calls 4 library calls 99288->99371 99290 a19d70 GetCurrentThreadId 99290->99239 99292 a1d80e __tzset_nolock 99291->99292 99293 a19e3b __lock 58 API calls 99292->99293 99294 a1d815 99293->99294 99295 a18a05 __calloc_crt 58 API calls 99294->99295 99297 a1d826 99295->99297 99296 a1d891 GetStartupInfoW 99304 a1d8a6 99296->99304 99305 a1d9d5 99296->99305 99297->99296 99298 a1d831 __tzset_nolock @_EH4_CallFilterFunc@8 99297->99298 99298->99243 99299 a1da9d 99386 a1daad LeaveCriticalSection _doexit 99299->99386 99301 a18a05 __calloc_crt 58 API calls 99301->99304 99302 a1da22 GetStdHandle 99302->99305 99303 a1da35 GetFileType 99303->99305 99304->99301 99304->99305 99306 a1d8f4 99304->99306 99305->99299 99305->99302 99305->99303 99385 a1a05b InitializeCriticalSectionAndSpinCount 99305->99385 99306->99305 99307 a1d928 GetFileType 99306->99307 99384 a1a05b InitializeCriticalSectionAndSpinCount 99306->99384 99307->99306 99311 a25164 99310->99311 99312 a17f33 99310->99312 99387 a18a4d 58 API calls 2 library calls 99311->99387 99316 a24d4b GetModuleFileNameW 99312->99316 99314 a2518a _memmove 99315 a251a0 FreeEnvironmentStringsW 99314->99315 99315->99312 99317 a24d7f _wparse_cmdline 99316->99317 99319 a24dbf _wparse_cmdline 99317->99319 99388 a18a4d 58 API calls 2 library calls 99317->99388 99319->99250 99321 a24fa1 __NMSG_WRITE 99320->99321 99325 a24f99 99320->99325 99322 a18a05 __calloc_crt 58 API calls 99321->99322 99330 a24fca __NMSG_WRITE 99322->99330 99323 a25021 99324 a12f85 _free 58 API calls 99323->99324 99324->99325 99325->99254 99326 a18a05 __calloc_crt 58 API calls 99326->99330 99327 a25046 99329 a12f85 _free 58 API calls 99327->99329 99329->99325 99330->99323 99330->99325 99330->99326 99330->99327 99331 a2505d 99330->99331 99389 a24837 58 API calls __Wcsftime_l 99330->99389 99390 a18ff6 IsProcessorFeaturePresent 99331->99390 99333 a25069 99333->99254 99335 a1332b __IsNonwritableInCurrentImage 99334->99335 99413 a1a701 99335->99413 99337 a13349 __initterm_e 99338 a12f70 __cinit 67 API calls 99337->99338 99339 a13368 _doexit __IsNonwritableInCurrentImage 99337->99339 99338->99339 99339->99257 99341 a05fa5 99340->99341 99342 a06044 99340->99342 99343 a05fdf IsThemeActive 99341->99343 99342->99262 99416 a1359c 99343->99416 99347 a0600b 99428 a05f00 SystemParametersInfoW SystemParametersInfoW 99347->99428 99349 a06017 99429 a05240 99349->99429 99351 a0601f SystemParametersInfoW 99351->99342 99352->99236 99353->99240 99354->99248 99358->99263 99359->99266 99360->99272 99361->99274 99362->99278 99363->99279 99365 a18a0c 99364->99365 99367 a18a47 99365->99367 99369 a18a2a 99365->99369 99373 a25426 99365->99373 99367->99283 99370 a1a016 TlsSetValue 99367->99370 99369->99365 99369->99367 99381 a1a362 Sleep 99369->99381 99370->99286 99371->99290 99372->99287 99374 a25431 99373->99374 99379 a2544c 99373->99379 99375 a2543d 99374->99375 99374->99379 99382 a18d58 58 API calls __getptd_noexit 99375->99382 99377 a2545c HeapAlloc 99378 a25442 99377->99378 99377->99379 99378->99365 99379->99377 99379->99378 99383 a135d1 DecodePointer 99379->99383 99381->99369 99382->99378 99383->99379 99384->99306 99385->99305 99386->99298 99387->99314 99388->99319 99389->99330 99391 a19001 99390->99391 99396 a18e89 99391->99396 99395 a1901c 99395->99333 99397 a18ea3 _memset __call_reportfault 99396->99397 99398 a18ec3 IsDebuggerPresent 99397->99398 99404 a1a385 SetUnhandledExceptionFilter UnhandledExceptionFilter 99398->99404 99401 a18f87 __call_reportfault 99405 a1c826 99401->99405 99402 a18faa 99403 a1a370 GetCurrentProcess TerminateProcess 99402->99403 99403->99395 99404->99401 99406 a1c830 IsProcessorFeaturePresent 99405->99406 99407 a1c82e 99405->99407 99409 a25b3a 99406->99409 99407->99402 99412 a25ae9 5 API calls 2 library calls 99409->99412 99411 a25c1d 99411->99402 99412->99411 99414 a1a704 EncodePointer 99413->99414 99414->99414 99415 a1a71e 99414->99415 99415->99337 99417 a19e3b __lock 58 API calls 99416->99417 99418 a135a7 DecodePointer EncodePointer 99417->99418 99481 a19fa5 LeaveCriticalSection 99418->99481 99420 a06004 99421 a13604 99420->99421 99422 a13628 99421->99422 99423 a1360e 99421->99423 99422->99347 99423->99422 99482 a18d58 58 API calls __getptd_noexit 99423->99482 99425 a13618 99483 a18fe6 9 API calls __Wcsftime_l 99425->99483 99427 a13623 99427->99347 99428->99349 99430 a0524d __write_nolock 99429->99430 99431 a01207 59 API calls 99430->99431 99432 a05258 GetCurrentDirectoryW 99431->99432 99484 a04ec8 99432->99484 99434 a0527e IsDebuggerPresent 99435 a40b21 MessageBoxA 99434->99435 99436 a0528c 99434->99436 99438 a40b39 99435->99438 99437 a052a0 99436->99437 99436->99438 99552 a031bf 99437->99552 99607 a0314d 59 API calls Mailbox 99438->99607 99441 a40b49 99448 a40b5f SetCurrentDirectoryW 99441->99448 99447 a0536c Mailbox 99447->99351 99448->99447 99481->99420 99482->99425 99483->99427 99485 a01207 59 API calls 99484->99485 99486 a04ede 99485->99486 99616 a05420 99486->99616 99488 a04efc 99489 a019e1 59 API calls 99488->99489 99490 a04f10 99489->99490 99491 a01c9c 59 API calls 99490->99491 99492 a04f1b 99491->99492 99493 9f477a 59 API calls 99492->99493 99494 a04f27 99493->99494 99495 a01a36 59 API calls 99494->99495 99496 a04f34 99495->99496 99497 9f39be 68 API calls 99496->99497 99498 a04f44 Mailbox 99497->99498 99499 a01a36 59 API calls 99498->99499 99500 a04f68 99499->99500 99501 9f39be 68 API calls 99500->99501 99502 a04f77 Mailbox 99501->99502 99503 a01207 59 API calls 99502->99503 99504 a04f94 99503->99504 99630 a055bc 99504->99630 99507 a1312d _W_store_winword 60 API calls 99508 a04fae 99507->99508 99509 a40a54 99508->99509 99510 a04fb8 99508->99510 99511 a055bc 59 API calls 99509->99511 99512 a1312d _W_store_winword 60 API calls 99510->99512 99514 a40a68 99511->99514 99513 a04fc3 99512->99513 99513->99514 99515 a04fcd 99513->99515 99516 a055bc 59 API calls 99514->99516 99517 a1312d _W_store_winword 60 API calls 99515->99517 99518 a40a84 99516->99518 99519 a04fd8 99517->99519 99521 a100cf 61 API calls 99518->99521 99519->99518 99520 a04fe2 99519->99520 99522 a1312d _W_store_winword 60 API calls 99520->99522 99523 a40aa7 99521->99523 99524 a04fed 99522->99524 99525 a055bc 59 API calls 99523->99525 99526 a04ff7 99524->99526 99527 a40ad0 99524->99527 99528 a40ab3 99525->99528 99529 a0501b 99526->99529 99532 a01c9c 59 API calls 99526->99532 99530 a055bc 59 API calls 99527->99530 99531 a01c9c 59 API calls 99528->99531 99537 9f47be 59 API calls 99529->99537 99533 a40aee 99530->99533 99535 a40ac1 99531->99535 99536 a0500e 99532->99536 99534 a01c9c 59 API calls 99533->99534 99538 a40afc 99534->99538 99539 a055bc 59 API calls 99535->99539 99540 a055bc 59 API calls 99536->99540 99541 a0502a 99537->99541 99543 a055bc 59 API calls 99538->99543 99539->99527 99540->99529 99542 9f4540 59 API calls 99541->99542 99544 a05038 99542->99544 99545 a40b0b 99543->99545 99546 9f43d0 59 API calls 99544->99546 99545->99545 99547 a05055 99546->99547 99548 9f477a 59 API calls 99547->99548 99549 9f43d0 59 API calls 99547->99549 99550 a055bc 59 API calls 99547->99550 99551 a0509b Mailbox 99547->99551 99548->99547 99549->99547 99550->99547 99551->99434 99553 a031cc __write_nolock 99552->99553 99554 a40314 _memset 99553->99554 99555 a031e5 99553->99555 99557 a40330 GetOpenFileNameW 99554->99557 99556 a10284 60 API calls 99555->99556 99558 a031ee 99556->99558 99559 a4037f 99557->99559 99642 a109c5 99558->99642 99561 a01821 59 API calls 99559->99561 99563 a40394 99561->99563 99563->99563 99565 a03203 99660 a0278a 99565->99660 99607->99441 99617 a0542d __write_nolock 99616->99617 99618 a01821 59 API calls 99617->99618 99624 a05590 Mailbox 99617->99624 99620 a0545f 99618->99620 99619 a01609 59 API calls 99619->99620 99620->99619 99629 a05495 Mailbox 99620->99629 99621 a01609 59 API calls 99621->99629 99622 a05563 99623 a01a36 59 API calls 99622->99623 99622->99624 99625 a05584 99623->99625 99624->99488 99627 a04c94 59 API calls 99625->99627 99626 a01a36 59 API calls 99626->99629 99627->99624 99629->99621 99629->99622 99629->99624 99629->99626 99636 a04c94 99629->99636 99631 a055c6 99630->99631 99632 a055df 99630->99632 99633 a01c9c 59 API calls 99631->99633 99634 a01821 59 API calls 99632->99634 99635 a04fa0 99633->99635 99634->99635 99635->99507 99637 a04ca2 99636->99637 99641 a04cc4 _memmove 99636->99641 99639 a10fe6 Mailbox 59 API calls 99637->99639 99638 a10fe6 Mailbox 59 API calls 99640 a04cd8 99638->99640 99639->99641 99640->99629 99641->99638 99643 a21b70 __write_nolock 99642->99643 99644 a109d2 GetLongPathNameW 99643->99644 99645 a01821 59 API calls 99644->99645 99646 a031f7 99645->99646 99647 a02f3d 99646->99647 99648 a01207 59 API calls 99647->99648 99649 a02f4f 99648->99649 99650 a10284 60 API calls 99649->99650 99651 a02f5a 99650->99651 99652 a40177 99651->99652 99653 a02f65 99651->99653 99658 a40191 99652->99658 99700 a0151f 61 API calls 99652->99700 99654 a04c94 59 API calls 99653->99654 99656 a02f71 99654->99656 99694 9f1307 99656->99694 99659 a02f84 Mailbox 99659->99565 99701 a049c2 99660->99701 99663 a3f8d6 99818 a59b16 99663->99818 99665 a049c2 136 API calls 99667 a027c3 99665->99667 99667->99663 99670 a027cb 99667->99670 99668 a3f8eb 99669 a3f908 99672 a10fe6 Mailbox 59 API calls 99669->99672 99673 a3f8f3 99670->99673 99674 a027d7 99670->99674 99693 a3f94d Mailbox 99672->99693 99882 a547e8 90 API calls _wprintf 99673->99882 99725 a029be 99674->99725 99677 a3f901 99677->99669 99696 9f1319 99694->99696 99699 9f1338 _memmove 99694->99699 99695 a10fe6 Mailbox 59 API calls 99698 9f134f 99695->99698 99697 a10fe6 Mailbox 59 API calls 99696->99697 99697->99699 99698->99659 99699->99695 99700->99652 99885 a04b29 99701->99885 99706 a049ed LoadLibraryExW 99895 a04ade 99706->99895 99707 a408bb 99708 a04a2f 84 API calls 99707->99708 99710 a408c2 99708->99710 99712 a04ade 3 API calls 99710->99712 99714 a408ca 99712->99714 99921 a04ab2 99714->99921 99715 a04a14 99715->99714 99716 a04a20 99715->99716 99717 a04a2f 84 API calls 99716->99717 99719 a027af 99717->99719 99719->99663 99719->99665 99722 a408f1 99929 a04a6e 99722->99929 99726 a3fd14 99725->99726 99727 a029e7 99725->99727 100302 a4ff5c 89 API calls 4 library calls 99726->100302 100286 a03df7 60 API calls Mailbox 99727->100286 99730 a3fd27 100303 a4ff5c 89 API calls 4 library calls 99730->100303 99731 a02a09 100287 a03e47 67 API calls 99731->100287 99819 a04a8c 85 API calls 99818->99819 99820 a59b85 99819->99820 100311 a59cf1 99820->100311 99823 a04ab2 74 API calls 99824 a59bb4 99823->99824 99851 a3f8e7 99851->99668 99851->99669 99882->99677 99934 a04b77 99885->99934 99888 a04b50 99890 a04b60 FreeLibrary 99888->99890 99891 a049d4 99888->99891 99889 a04b77 2 API calls 99889->99888 99890->99891 99892 a1547b 99891->99892 99938 a15490 99892->99938 99894 a049e1 99894->99706 99894->99707 100019 a04baa 99895->100019 99898 a04b03 99900 a04b15 FreeLibrary 99898->99900 99901 a04a05 99898->99901 99899 a04baa 2 API calls 99899->99898 99900->99901 99902 a048b0 99901->99902 99903 a10fe6 Mailbox 59 API calls 99902->99903 99904 a048c5 99903->99904 99905 a0433f 59 API calls 99904->99905 99906 a048d1 _memmove 99905->99906 99907 a0490c 99906->99907 99908 a4080a 99906->99908 99909 a04a6e 69 API calls 99907->99909 99910 a40817 99908->99910 100028 a59ed8 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 99908->100028 99912 a04915 99909->99912 100029 a59f5e 95 API calls 99910->100029 99914 a04ab2 74 API calls 99912->99914 99915 a40859 99912->99915 99918 a04a8c 85 API calls 99912->99918 99920 a049a0 99912->99920 99914->99912 100023 a04a8c 99915->100023 99918->99912 99919 a04ab2 74 API calls 99919->99920 99920->99715 99922 a40945 99921->99922 99923 a04ac4 99921->99923 100135 a15802 99923->100135 99926 a596c4 100260 a5951a 99926->100260 99928 a596da 99928->99722 99930 a40908 99929->99930 99931 a04a7d 99929->99931 100265 a15e80 99931->100265 99935 a04b44 99934->99935 99936 a04b80 LoadLibraryA 99934->99936 99935->99888 99935->99889 99936->99935 99937 a04b91 GetProcAddress 99936->99937 99937->99935 99939 a1549c __tzset_nolock 99938->99939 99940 a154af 99939->99940 99943 a154e0 99939->99943 99987 a18d58 58 API calls __getptd_noexit 99940->99987 99942 a154b4 99988 a18fe6 9 API calls __Wcsftime_l 99942->99988 99957 a20718 99943->99957 99946 a154e5 99947 a154fb 99946->99947 99948 a154ee 99946->99948 99950 a15525 99947->99950 99951 a15505 99947->99951 99989 a18d58 58 API calls __getptd_noexit 99948->99989 99972 a20837 99950->99972 99990 a18d58 58 API calls __getptd_noexit 99951->99990 99952 a154bf __tzset_nolock @_EH4_CallFilterFunc@8 99952->99894 99958 a20724 __tzset_nolock 99957->99958 99959 a19e3b __lock 58 API calls 99958->99959 99970 a20732 99959->99970 99960 a207a6 99992 a2082e 99960->99992 99961 a207ad 99997 a18a4d 58 API calls 2 library calls 99961->99997 99964 a207b4 99964->99960 99998 a1a05b InitializeCriticalSectionAndSpinCount 99964->99998 99965 a20823 __tzset_nolock 99965->99946 99967 a19ec3 __mtinitlocknum 58 API calls 99967->99970 99969 a207da EnterCriticalSection 99969->99960 99970->99960 99970->99961 99970->99967 99995 a16e7d 59 API calls __lock 99970->99995 99996 a16ee7 LeaveCriticalSection LeaveCriticalSection _doexit 99970->99996 99981 a20857 __wopenfile 99972->99981 99973 a20871 100003 a18d58 58 API calls __getptd_noexit 99973->100003 99975 a20a2c 99975->99973 99979 a20a8f 99975->99979 99976 a20876 100004 a18fe6 9 API calls __Wcsftime_l 99976->100004 99978 a15530 99991 a15552 LeaveCriticalSection LeaveCriticalSection __wfsopen 99978->99991 100000 a287d1 99979->100000 99981->99973 99981->99975 99981->99981 100005 a139fb 60 API calls 2 library calls 99981->100005 99983 a20a25 99983->99975 100006 a139fb 60 API calls 2 library calls 99983->100006 99985 a20a44 99985->99975 100007 a139fb 60 API calls 2 library calls 99985->100007 99987->99942 99988->99952 99989->99952 99990->99952 99991->99952 99999 a19fa5 LeaveCriticalSection 99992->99999 99994 a20835 99994->99965 99995->99970 99996->99970 99997->99964 99998->99969 99999->99994 100008 a27fb5 100000->100008 100002 a287ea 100002->99978 100003->99976 100004->99978 100005->99983 100006->99985 100007->99975 100009 a27fc1 __tzset_nolock 100008->100009 100010 a27fd7 100009->100010 100013 a2800d 100009->100013 100011 a18d58 __Wcsftime_l 58 API calls 100010->100011 100012 a27fdc 100011->100012 100015 a18fe6 __Wcsftime_l 9 API calls 100012->100015 100014 a2807e __wsopen_nolock 109 API calls 100013->100014 100016 a28029 100014->100016 100018 a27fe6 __tzset_nolock 100015->100018 100017 a28052 __wsopen_helper LeaveCriticalSection 100016->100017 100017->100018 100018->100002 100020 a04af7 100019->100020 100021 a04bb3 LoadLibraryA 100019->100021 100020->99898 100020->99899 100021->100020 100022 a04bc4 GetProcAddress 100021->100022 100022->100020 100024 a40923 100023->100024 100025 a04a9b 100023->100025 100030 a15a6d 100025->100030 100027 a04aa9 100027->99919 100028->99910 100029->99912 100034 a15a79 __tzset_nolock 100030->100034 100031 a15a8b 100061 a18d58 58 API calls __getptd_noexit 100031->100061 100033 a15ab1 100043 a16e3e 100033->100043 100034->100031 100034->100033 100035 a15a90 100062 a18fe6 9 API calls __Wcsftime_l 100035->100062 100042 a15a9b __tzset_nolock 100042->100027 100044 a16e70 EnterCriticalSection 100043->100044 100045 a16e4e 100043->100045 100047 a15ab7 100044->100047 100045->100044 100046 a16e56 100045->100046 100048 a19e3b __lock 58 API calls 100046->100048 100049 a159de 100047->100049 100048->100047 100050 a159fc 100049->100050 100051 a159ec 100049->100051 100054 a15a12 100050->100054 100064 a15af0 100050->100064 100134 a18d58 58 API calls __getptd_noexit 100051->100134 100093 a14c5d 100054->100093 100055 a159f1 100063 a15ae8 LeaveCriticalSection LeaveCriticalSection __wfsopen 100055->100063 100061->100035 100062->100042 100063->100042 100065 a15afd __write_nolock 100064->100065 100066 a15b15 100065->100066 100067 a15b2d 100065->100067 100068 a18d58 __Wcsftime_l 58 API calls 100066->100068 100069 a14906 __filbuf 58 API calls 100067->100069 100094 a14c70 100093->100094 100098 a14c94 100093->100098 100094->100098 100134->100055 100138 a1581d 100135->100138 100137 a04ad5 100137->99926 100139 a15829 __tzset_nolock 100138->100139 100140 a1586c 100139->100140 100142 a1583f _memset 100139->100142 100150 a15864 __tzset_nolock 100139->100150 100141 a16e3e __lock_file 59 API calls 100140->100141 100143 a15872 100141->100143 100165 a18d58 58 API calls __getptd_noexit 100142->100165 100151 a1563d 100143->100151 100146 a15859 100166 a18fe6 9 API calls __Wcsftime_l 100146->100166 100150->100137 100152 a15673 100151->100152 100156 a15658 _memset 100151->100156 100167 a158a6 LeaveCriticalSection LeaveCriticalSection __wfsopen 100152->100167 100153 a15663 100256 a18d58 58 API calls __getptd_noexit 100153->100256 100155 a156b3 100155->100152 100159 a157c4 _memset 100155->100159 100160 a14906 __filbuf 58 API calls 100155->100160 100168 a2108b 100155->100168 100236 a20dd7 100155->100236 100258 a20ef8 58 API calls 3 library calls 100155->100258 100156->100152 100156->100153 100156->100155 100259 a18d58 58 API calls __getptd_noexit 100159->100259 100160->100155 100164 a15668 100257 a18fe6 9 API calls __Wcsftime_l 100164->100257 100165->100146 100166->100150 100167->100150 100169 a210c3 100168->100169 100170 a210ac 100168->100170 100172 a217fb 100169->100172 100176 a210fd 100169->100176 100171 a18d24 __write 58 API calls 100170->100171 100173 a210b1 100171->100173 100174 a18d24 __write 58 API calls 100172->100174 100175 a18d58 __Wcsftime_l 58 API calls 100173->100175 100177 a21800 100174->100177 100216 a210b8 100175->100216 100178 a21105 100176->100178 100185 a2111c 100176->100185 100179 a18d58 __Wcsftime_l 58 API calls 100177->100179 100181 a18d24 __write 58 API calls 100178->100181 100180 a21111 100179->100180 100183 a18fe6 __Wcsftime_l 9 API calls 100180->100183 100182 a2110a 100181->100182 100188 a18d58 __Wcsftime_l 58 API calls 100182->100188 100183->100216 100184 a21131 100186 a18d24 __write 58 API calls 100184->100186 100185->100184 100187 a2114b 100185->100187 100189 a21169 100185->100189 100185->100216 100186->100182 100187->100184 100193 a21156 100187->100193 100188->100180 100190 a18a4d __malloc_crt 58 API calls 100189->100190 100191 a21179 100190->100191 100194 a21181 100191->100194 100195 a2119c 100191->100195 100192 a25e9b __flswbuf 58 API calls 100196 a2126a 100192->100196 100193->100192 100197 a18d58 __Wcsftime_l 58 API calls 100194->100197 100199 a21af1 __lseeki64_nolock 60 API calls 100195->100199 100198 a212e3 ReadFile 100196->100198 100203 a21280 GetConsoleMode 100196->100203 100200 a21186 100197->100200 100201 a217c3 GetLastError 100198->100201 100202 a21305 100198->100202 100199->100193 100204 a18d24 __write 58 API calls 100200->100204 100205 a217d0 100201->100205 100206 a212c3 100201->100206 100202->100201 100210 a212d5 100202->100210 100207 a212e0 100203->100207 100208 a21294 100203->100208 100204->100216 100209 a18d58 __Wcsftime_l 58 API calls 100205->100209 100214 a18d37 __dosmaperr 58 API calls 100206->100214 100222 a212c9 100206->100222 100207->100198 100208->100207 100211 a2129a ReadConsoleW 100208->100211 100218 a215a7 100210->100218 100220 a2133a 100210->100220 100210->100222 100211->100210 100213 a212bd GetLastError 100211->100213 100213->100206 100214->100222 100216->100155 100218->100222 100222->100216 100237 a20de2 100236->100237 100240 a20df7 100236->100240 100238 a18d58 __Wcsftime_l 58 API calls 100237->100238 100239 a20de7 100238->100239 100241 a18fe6 __Wcsftime_l 9 API calls 100239->100241 100242 a20e2c 100240->100242 100243 a26214 __getbuf 58 API calls 100240->100243 100248 a20df2 100240->100248 100241->100248 100244 a14906 __filbuf 58 API calls 100242->100244 100243->100242 100245 a20e40 100244->100245 100246 a20f77 __read 72 API calls 100245->100246 100247 a20e47 100246->100247 100247->100248 100249 a14906 __filbuf 58 API calls 100247->100249 100248->100155 100250 a20e6a 100249->100250 100250->100248 100251 a14906 __filbuf 58 API calls 100250->100251 100252 a20e76 100251->100252 100252->100248 100253 a14906 __filbuf 58 API calls 100252->100253 100256->100164 100257->100152 100258->100155 100259->100164 100263 a1542a GetSystemTimeAsFileTime 100260->100263 100262 a59529 100262->99928 100264 a15458 __aulldiv 100263->100264 100264->100262 100266 a15e8c __tzset_nolock 100265->100266 100267 a15eb3 100266->100267 100268 a15e9e 100266->100268 100270 a16e3e __lock_file 59 API calls 100267->100270 100278 a18d58 58 API calls __getptd_noexit 100268->100278 100272 a15eb9 100270->100272 100271 a15ea3 100279 a18fe6 9 API calls __Wcsftime_l 100271->100279 100274 a15af0 __ftell_nolock 67 API calls 100272->100274 100276 a15ec4 100274->100276 100275 a15eae __tzset_nolock 100278->100271 100279->100275 100286->99731 100302->99730 100313 a59d05 __tzset_nolock _wcscmp 100311->100313 100312 a04ab2 74 API calls 100312->100313 100313->100312 100314 a596c4 GetSystemTimeAsFileTime 100313->100314 100315 a59b99 100313->100315 100316 a04a8c 85 API calls 100313->100316 100314->100313 100315->99823 100315->99851 100316->100313 100485 9f107d 100490 a02fc5 100485->100490 100487 9f108c 100488 a12f70 __cinit 67 API calls 100487->100488 100489 9f1096 100488->100489 100491 a02fd5 __write_nolock 100490->100491 100492 a01207 59 API calls 100491->100492 100493 a0308b 100492->100493 100494 a100cf 61 API calls 100493->100494 100495 a03094 100494->100495 100521 a108c1 100495->100521 100498 a01900 59 API calls 100499 a030ad 100498->100499 100500 a04c94 59 API calls 100499->100500 100501 a030bc 100500->100501 100502 a01207 59 API calls 100501->100502 100503 a030c5 100502->100503 100504 a019e1 59 API calls 100503->100504 100505 a030ce RegOpenKeyExW 100504->100505 100506 a401a3 RegQueryValueExW 100505->100506 100511 a030f0 Mailbox 100505->100511 100507 a40235 RegCloseKey 100506->100507 100508 a401c0 100506->100508 100507->100511 100514 a40247 _wcscat Mailbox __NMSG_WRITE 100507->100514 100509 a10fe6 Mailbox 59 API calls 100508->100509 100510 a401d9 100509->100510 100513 a0433f 59 API calls 100510->100513 100511->100487 100512 a01609 59 API calls 100512->100514 100515 a401e4 RegQueryValueExW 100513->100515 100514->100511 100514->100512 100519 a01a36 59 API calls 100514->100519 100520 a04c94 59 API calls 100514->100520 100516 a40201 100515->100516 100518 a4021b 100515->100518 100517 a01821 59 API calls 100516->100517 100517->100518 100518->100507 100519->100514 100520->100514 100522 a21b70 __write_nolock 100521->100522 100523 a108ce GetFullPathNameW 100522->100523 100524 a108f0 100523->100524 100525 a01821 59 API calls 100524->100525 100526 a0309f 100525->100526 100526->100498 100527 a04d83 100528 a04dba 100527->100528 100529 a04e37 100528->100529 100530 a04dd8 100528->100530 100567 a04e35 100528->100567 100531 a409c2 100529->100531 100532 a04e3d 100529->100532 100533 a04de5 100530->100533 100534 a04ead PostQuitMessage 100530->100534 100582 9fc460 10 API calls Mailbox 100531->100582 100536 a04e42 100532->100536 100537 a04e65 SetTimer RegisterWindowMessageW 100532->100537 100538 a04df0 100533->100538 100539 a40a35 100533->100539 100541 a04e28 100534->100541 100535 a04e1a DefWindowProcW 100535->100541 100542 a40965 100536->100542 100543 a04e49 KillTimer 100536->100543 100537->100541 100544 a04e8e CreatePopupMenu 100537->100544 100545 a04eb7 100538->100545 100546 a04df8 100538->100546 100585 a52cce 97 API calls _memset 100539->100585 100549 a4099e MoveWindow 100542->100549 100550 a4096a 100542->100550 100551 a05ac3 Shell_NotifyIconW 100543->100551 100544->100541 100572 a05b29 100545->100572 100552 a04e03 100546->100552 100553 a40a1a 100546->100553 100548 a409e9 100583 9fc483 274 API calls Mailbox 100548->100583 100549->100541 100557 a4098d SetFocus 100550->100557 100558 a4096e 100550->100558 100559 a04e5c 100551->100559 100560 a04e9b 100552->100560 100561 a04e0e 100552->100561 100553->100535 100584 a48854 59 API calls Mailbox 100553->100584 100554 a40a47 100554->100535 100554->100541 100557->100541 100558->100561 100562 a40977 100558->100562 100579 9f34e4 DeleteObject DestroyWindow Mailbox 100559->100579 100580 a05bd7 107 API calls _memset 100560->100580 100561->100535 100569 a05ac3 Shell_NotifyIconW 100561->100569 100581 9fc460 10 API calls Mailbox 100562->100581 100567->100535 100568 a04eab 100568->100541 100570 a40a0e 100569->100570 100571 a059d3 94 API calls 100570->100571 100571->100567 100573 a05b40 _memset 100572->100573 100574 a05bc2 100572->100574 100575 a056f8 87 API calls 100573->100575 100574->100541 100577 a05b67 100575->100577 100576 a05bab KillTimer SetTimer 100576->100574 100577->100576 100578 a40d6e Shell_NotifyIconW 100577->100578 100578->100576 100579->100541 100580->100568 100581->100541 100582->100548 100583->100561 100584->100567 100585->100554 100586 9f7357 100587 9f78f5 100586->100587 100588 9f7360 100586->100588 100596 9f6fdb Mailbox 100587->100596 100597 a487f9 59 API calls _memmove 100587->100597 100588->100587 100589 9f4d37 84 API calls 100588->100589 100590 9f738b 100589->100590 100590->100587 100592 9f739b 100590->100592 100594 a01680 59 API calls 100592->100594 100593 a2f91b 100595 a01c9c 59 API calls 100593->100595 100594->100596 100595->100596 100597->100593 100598 9f1016 100603 a05ce7 100598->100603 100601 a12f70 __cinit 67 API calls 100602 9f1025 100601->100602 100604 a10fe6 Mailbox 59 API calls 100603->100604 100605 a05cef 100604->100605 100606 9f101b 100605->100606 100610 a05f39 100605->100610 100606->100601 100611 a05f42 100610->100611 100612 a05cfb 100610->100612 100613 a12f70 __cinit 67 API calls 100611->100613 100614 a05d13 100612->100614 100613->100612 100615 a01207 59 API calls 100614->100615 100616 a05d2b GetVersionExW 100615->100616 100617 a01821 59 API calls 100616->100617 100618 a05d6e 100617->100618 100619 a01981 59 API calls 100618->100619 100623 a05d9b 100618->100623 100620 a05d8f 100619->100620 100621 a0133d 59 API calls 100620->100621 100621->100623 100622 a05e00 GetCurrentProcess IsWow64Process 100624 a05e19 100622->100624 100623->100622 100625 a41098 100623->100625 100626 a05e98 GetSystemInfo 100624->100626 100627 a05e2f 100624->100627 100628 a05e65 100626->100628 100638 a055f0 100627->100638 100628->100606 100631 a05e41 100634 a055f0 2 API calls 100631->100634 100632 a05e8c GetSystemInfo 100633 a05e56 100632->100633 100633->100628 100636 a05e5c FreeLibrary 100633->100636 100635 a05e49 GetNativeSystemInfo 100634->100635 100635->100633 100636->100628 100639 a05619 100638->100639 100640 a055f9 LoadLibraryA 100638->100640 100639->100631 100639->100632 100640->100639 100641 a0560a GetProcAddress 100640->100641 100641->100639 100642 9f1055 100647 9f2a19 100642->100647 100645 a12f70 __cinit 67 API calls 100646 9f1064 100645->100646 100648 a01207 59 API calls 100647->100648 100649 9f2a87 100648->100649 100654 9f1256 100649->100654 100652 9f2b24 100653 9f105a 100652->100653 100657 9f13f8 59 API calls 2 library calls 100652->100657 100653->100645 100658 9f1284 100654->100658 100657->100652 100659 9f1275 100658->100659 100660 9f1291 100658->100660 100659->100652 100660->100659 100661 9f1298 RegOpenKeyExW 100660->100661 100661->100659 100662 9f12b2 RegQueryValueExW 100661->100662 100663 9f12e8 RegCloseKey 100662->100663 100664 9f12d3 100662->100664 100663->100659 100664->100663 100665 9f5ff5 100689 9f5ede Mailbox _memmove 100665->100689 100666 a10fe6 59 API calls Mailbox 100666->100689 100667 9f6a9b 100788 9fa9de 274 API calls 100667->100788 100669 9f53b0 274 API calls 100669->100689 100670 a2eff9 100800 9f5190 59 API calls Mailbox 100670->100800 100672 a2f007 100801 a5a48d 89 API calls 4 library calls 100672->100801 100676 a2efeb 100722 9f5569 Mailbox 100676->100722 100799 a46cf1 59 API calls Mailbox 100676->100799 100677 9f60e5 100678 a2e137 100677->100678 100682 9f63bd Mailbox 100677->100682 100692 9f6abc 100677->100692 100694 9f6152 Mailbox 100677->100694 100678->100682 100789 a47aad 59 API calls 100678->100789 100679 a01c9c 59 API calls 100679->100689 100681 a10fe6 Mailbox 59 API calls 100686 9f63d1 100681->100686 100682->100681 100696 9f6426 100682->100696 100683 a01a36 59 API calls 100683->100689 100684 9f523c 59 API calls 100684->100689 100688 9f63de 100686->100688 100686->100692 100687 a6c355 274 API calls 100687->100689 100690 a2e172 100688->100690 100691 9f6413 100688->100691 100689->100666 100689->100667 100689->100669 100689->100670 100689->100672 100689->100677 100689->100679 100689->100683 100689->100684 100689->100687 100689->100692 100689->100722 100792 a57f11 59 API calls Mailbox 100689->100792 100793 a46cf1 59 API calls Mailbox 100689->100793 100790 a6c87c 85 API calls 2 library calls 100690->100790 100691->100696 100724 9f5447 Mailbox 100691->100724 100798 a5a48d 89 API calls 4 library calls 100692->100798 100694->100676 100694->100692 100713 a2e2e9 VariantClear 100694->100713 100694->100722 100729 a6e60c 130 API calls 100694->100729 100732 9fcfd7 100694->100732 100751 a63105 100694->100751 100756 a65e1d 100694->100756 100781 a6ebba 100694->100781 100787 9f5190 59 API calls Mailbox 100694->100787 100794 a47aad 59 API calls 100694->100794 100791 a6c9c9 95 API calls Mailbox 100696->100791 100699 a2e19d 100699->100699 100700 a10fe6 59 API calls Mailbox 100700->100724 100701 a2e691 100795 a5a48d 89 API calls 4 library calls 100701->100795 100702 a2f165 100803 a5a48d 89 API calls 4 library calls 100702->100803 100705 9f6e30 60 API calls 100705->100724 100706 9f69fa 100710 a01c9c 59 API calls 100706->100710 100708 a2e6a0 100709 a01c9c 59 API calls 100709->100724 100710->100722 100712 a2ea9a 100715 a01c9c 59 API calls 100712->100715 100713->100694 100714 9f7e50 274 API calls 100714->100724 100715->100722 100716 a01207 59 API calls 100716->100724 100717 a47aad 59 API calls 100717->100724 100718 9f69ff 100718->100701 100718->100702 100719 a2eb67 100719->100722 100796 a47aad 59 API calls 100719->100796 100720 a12f70 67 API calls __cinit 100720->100724 100723 a2ef28 100797 a5a48d 89 API calls 4 library calls 100723->100797 100724->100700 100724->100701 100724->100705 100724->100706 100724->100709 100724->100712 100724->100714 100724->100716 100724->100717 100724->100718 100724->100719 100724->100720 100724->100722 100724->100723 100726 9f5a1a 100724->100726 100802 a5a48d 89 API calls 4 library calls 100726->100802 100729->100694 100733 9f4d37 84 API calls 100732->100733 100734 9fd001 100733->100734 100804 9f5278 100734->100804 100736 9fd018 100737 9fd57b 100736->100737 100747 9fd439 Mailbox __NMSG_WRITE 100736->100747 100809 9f502b 59 API calls 100736->100809 100737->100694 100739 a1312d _W_store_winword 60 API calls 100739->100747 100740 a0162d 59 API calls 100740->100747 100741 9f4f98 59 API calls 100741->100747 100744 a10c65 62 API calls 100744->100747 100745 9f4d37 84 API calls 100745->100747 100746 9f502b 59 API calls 100746->100747 100747->100737 100747->100739 100747->100740 100747->100741 100747->100744 100747->100745 100747->100746 100748 a01821 59 API calls 100747->100748 100749 a059d3 94 API calls 100747->100749 100750 a05ac3 Shell_NotifyIconW 100747->100750 100810 a0153b 59 API calls 2 library calls 100747->100810 100811 9f4f3c 59 API calls Mailbox 100747->100811 100748->100747 100749->100747 100750->100747 100752 9f523c 59 API calls 100751->100752 100753 a63118 100752->100753 100812 a57d6e 100753->100812 100755 a63120 100755->100694 100757 a65e46 100756->100757 100758 a65e74 WSAStartup 100757->100758 100849 9f502b 59 API calls 100757->100849 100760 a65e9d 100758->100760 100780 a65e88 Mailbox 100758->100780 100844 a040cd 100760->100844 100761 a65e61 100761->100758 100850 9f502b 59 API calls 100761->100850 100765 9f4d37 84 API calls 100767 a65eb2 100765->100767 100766 a65e70 100766->100758 100768 a0402a 61 API calls 100767->100768 100769 a65ebf inet_addr gethostbyname 100768->100769 100770 a65edd IcmpCreateFile 100769->100770 100769->100780 100771 a65f01 100770->100771 100770->100780 100772 a10fe6 Mailbox 59 API calls 100771->100772 100773 a65f1a 100772->100773 100774 a0433f 59 API calls 100773->100774 100775 a65f25 100774->100775 100776 a65f34 IcmpSendEcho 100775->100776 100777 a65f55 IcmpSendEcho 100775->100777 100779 a65f6d 100776->100779 100777->100779 100778 a65fd4 IcmpCloseHandle WSACleanup 100778->100780 100779->100778 100780->100694 100782 a6ebcd 100781->100782 100783 9f4d37 84 API calls 100782->100783 100786 a6ebdc 100782->100786 100784 a6ec0a 100783->100784 100851 a57ce4 100784->100851 100786->100694 100787->100694 100788->100692 100789->100682 100790->100696 100791->100699 100792->100689 100793->100689 100794->100694 100795->100708 100796->100722 100797->100726 100798->100676 100799->100722 100800->100676 100801->100676 100802->100722 100803->100722 100805 a10fe6 Mailbox 59 API calls 100804->100805 100806 9f5285 100805->100806 100807 a01a36 59 API calls 100806->100807 100808 9f5294 100806->100808 100807->100808 100808->100736 100809->100747 100810->100747 100811->100747 100813 a57d85 100812->100813 100832 a57ea5 100812->100832 100814 a57d9d 100813->100814 100815 a57dc5 100813->100815 100818 a57ddc 100813->100818 100814->100815 100817 a57dad 100814->100817 100816 a10fe6 Mailbox 59 API calls 100815->100816 100827 a57dbb Mailbox _memmove 100816->100827 100826 a10fe6 Mailbox 59 API calls 100817->100826 100819 a10fe6 Mailbox 59 API calls 100818->100819 100822 a57df9 100818->100822 100819->100822 100820 a57e24 100823 a10fe6 Mailbox 59 API calls 100820->100823 100821 a57e32 100824 a10fe6 Mailbox 59 API calls 100821->100824 100822->100820 100822->100821 100822->100827 100823->100827 100828 a57e38 100824->100828 100825 a10fe6 Mailbox 59 API calls 100825->100832 100826->100827 100827->100825 100833 a57a26 59 API calls Mailbox 100828->100833 100830 a57e44 100834 a0402a WideCharToMultiByte 100830->100834 100832->100755 100833->100830 100835 a04085 100834->100835 100836 a0404e 100834->100836 100843 a03f20 59 API calls Mailbox 100835->100843 100837 a10fe6 Mailbox 59 API calls 100836->100837 100839 a04055 WideCharToMultiByte 100837->100839 100842 a03f79 59 API calls 2 library calls 100839->100842 100841 a04077 100841->100827 100842->100841 100843->100841 100845 a10fe6 Mailbox 59 API calls 100844->100845 100846 a040e0 100845->100846 100847 a01c7e 59 API calls 100846->100847 100848 a040ed 100847->100848 100848->100765 100849->100761 100850->100766 100852 a57cf1 100851->100852 100853 a10fe6 Mailbox 59 API calls 100852->100853 100854 a57cf8 100853->100854 100857 a56135 100854->100857 100856 a57d3b Mailbox 100856->100786 100858 a01aa4 59 API calls 100857->100858 100859 a56148 CharLowerBuffW 100858->100859 100862 a5615b 100859->100862 100860 a01609 59 API calls 100860->100862 100861 a56195 100863 a561a7 100861->100863 100865 a01609 59 API calls 100861->100865 100862->100860 100862->100861 100874 a56165 _memset Mailbox 100862->100874 100864 a10fe6 Mailbox 59 API calls 100863->100864 100868 a561d5 100864->100868 100865->100863 100870 a561f4 100868->100870 100890 a56071 59 API calls 100868->100890 100869 a56233 100871 a10fe6 Mailbox 59 API calls 100869->100871 100869->100874 100875 a56292 100870->100875 100872 a5624d 100871->100872 100873 a10fe6 Mailbox 59 API calls 100872->100873 100873->100874 100874->100856 100876 a01207 59 API calls 100875->100876 100877 a562c4 100876->100877 100878 a01207 59 API calls 100877->100878 100879 a562cd 100878->100879 100880 a01207 59 API calls 100879->100880 100886 a562d6 _wcscmp 100880->100886 100881 a01821 59 API calls 100881->100886 100882 a13836 GetStringTypeW 100882->100886 100883 a0153b 59 API calls 100883->100886 100885 a137ba 59 API calls 100885->100886 100886->100881 100886->100882 100886->100883 100886->100885 100887 a56292 60 API calls 100886->100887 100888 a565ab Mailbox 100886->100888 100889 a01c9c 59 API calls 100886->100889 100891 a1385c GetStringTypeW _iswctype 100886->100891 100887->100886 100888->100869 100889->100886 100890->100868 100891->100886 100892 a592c8 100893 a592d5 100892->100893 100894 a592db 100892->100894 100895 a12f85 _free 58 API calls 100893->100895 100896 a592ec 100894->100896 100897 a12f85 _free 58 API calls 100894->100897 100895->100894 100898 a12f85 _free 58 API calls 100896->100898 100899 a592fe 100896->100899 100897->100896 100898->100899 100900 9f9a6c 100903 9f829c 100900->100903 100902 9f9a78 100904 9f8308 100903->100904 100905 9f82b4 100903->100905 100910 9f8331 100904->100910 100912 a5a48d 89 API calls 4 library calls 100904->100912 100905->100904 100906 9f53b0 274 API calls 100905->100906 100908 9f82eb 100906->100908 100908->100910 100911 9f523c 59 API calls 100908->100911 100909 a30ed8 100909->100909 100910->100902 100911->100904 100912->100909 100913 9f9b8b 100916 9f86e0 100913->100916 100917 9f86fd 100916->100917 100918 a30ff8 100917->100918 100919 a30fad 100917->100919 100940 9f8724 100917->100940 100951 a6aad0 274 API calls __cinit 100918->100951 100922 a30fb5 100919->100922 100926 a30fc2 100919->100926 100919->100940 100920 9f5278 59 API calls 100920->100940 100949 a6b0e4 274 API calls 100922->100949 100924 a12f70 __cinit 67 API calls 100924->100940 100929 9f898d 100926->100929 100950 a6b58c 274 API calls 3 library calls 100926->100950 100927 a31289 100927->100927 100933 9f8a17 100929->100933 100954 a5a48d 89 API calls 4 library calls 100929->100954 100930 a311af 100953 a6ae3b 89 API calls 100930->100953 100934 9f39be 68 API calls 100934->100940 100938 9f523c 59 API calls 100938->100940 100939 9f3c30 68 API calls 100939->100940 100940->100920 100940->100924 100940->100929 100940->100930 100940->100933 100940->100934 100940->100938 100940->100939 100941 9f3f42 68 API calls 100940->100941 100942 9f53b0 274 API calls 100940->100942 100943 a01c9c 59 API calls 100940->100943 100945 9f3938 68 API calls 100940->100945 100946 9f855e 274 API calls 100940->100946 100947 9f84e2 89 API calls 100940->100947 100948 9f835f 274 API calls 100940->100948 100952 a473ab 59 API calls 100940->100952 100941->100940 100942->100940 100943->100940 100945->100940 100946->100940 100947->100940 100948->100940 100949->100926 100950->100929 100951->100940 100952->100940 100953->100929 100954->100927 100955 9fac2a 100956 9fac2f 100955->100956 100957 a01207 59 API calls 100956->100957 100958 9fac39 100957->100958 100976 a10588 100958->100976 100962 9fac6b 100963 a01207 59 API calls 100962->100963 100964 9fac75 100963->100964 101004 a0fe2b 100964->101004 100966 9facbc 100967 9faccc GetStdHandle 100966->100967 100968 9fad18 100967->100968 100969 a32f39 100967->100969 100970 9fad20 OleInitialize 100968->100970 100969->100968 100971 a32f42 100969->100971 101011 a570f3 64 API calls Mailbox 100971->101011 100973 a32f49 101012 a577c2 CreateThread 100973->101012 100975 a32f55 CloseHandle 100975->100970 100977 a01207 59 API calls 100976->100977 100978 a10598 100977->100978 100979 a01207 59 API calls 100978->100979 100980 a105a0 100979->100980 101013 a010c3 100980->101013 100983 a010c3 59 API calls 100984 a105b0 100983->100984 100985 a01207 59 API calls 100984->100985 100986 a105bb 100985->100986 100987 a10fe6 Mailbox 59 API calls 100986->100987 100988 9fac43 100987->100988 100989 a0ff4c 100988->100989 100990 a0ff5a 100989->100990 100991 a01207 59 API calls 100990->100991 100992 a0ff65 100991->100992 100993 a01207 59 API calls 100992->100993 100994 a0ff70 100993->100994 100995 a01207 59 API calls 100994->100995 100996 a0ff7b 100995->100996 100997 a01207 59 API calls 100996->100997 100998 a0ff86 100997->100998 100999 a010c3 59 API calls 100998->100999 101000 a0ff91 100999->101000 101001 a10fe6 Mailbox 59 API calls 101000->101001 101002 a0ff98 RegisterWindowMessageW 101001->101002 101002->100962 101005 a4620c 101004->101005 101006 a0fe3b 101004->101006 101016 a5a12a 59 API calls 101005->101016 101007 a10fe6 Mailbox 59 API calls 101006->101007 101010 a0fe43 101007->101010 101009 a46217 101010->100966 101011->100973 101012->100975 101014 a01207 59 API calls 101013->101014 101015 a010cb 101014->101015 101015->100983 101016->101009 101017 9f9a88 101018 9f86e0 274 API calls 101017->101018 101019 9f9a96 101018->101019 101020 a348fb 101021 9fb020 274 API calls 101020->101021 101022 a34912 101021->101022 101024 9fcce0 101022->101024 101025 a5a48d 89 API calls 4 library calls 101022->101025 101024->101024 101025->101024 101026 a2dc5a 101027 a10fe6 Mailbox 59 API calls 101026->101027 101028 a2dc61 101027->101028 101029 a10fe6 Mailbox 59 API calls 101028->101029 101031 a2dc7a _memmove 101028->101031 101029->101031 101030 a10fe6 Mailbox 59 API calls 101032 a2dc9f 101030->101032 101031->101030 101033 9f1066 101034 9f106c 101033->101034 101035 a12f70 __cinit 67 API calls 101034->101035 101036 9f1076 101035->101036
                                                                APIs
                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A0526C
                                                                • IsDebuggerPresent.KERNEL32 ref: 00A0527E
                                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00A052E6
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                  • Part of subcall function 009FBBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 009FBC07
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A05366
                                                                • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00A40B2E
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A40B66
                                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00AA6D10), ref: 00A40BE9
                                                                • ShellExecuteW.SHELL32(00000000), ref: 00A40BF0
                                                                  • Part of subcall function 00A0514C: GetSysColorBrush.USER32(0000000F), ref: 00A05156
                                                                  • Part of subcall function 00A0514C: LoadCursorW.USER32(00000000,00007F00), ref: 00A05165
                                                                  • Part of subcall function 00A0514C: LoadIconW.USER32(00000063), ref: 00A0517C
                                                                  • Part of subcall function 00A0514C: LoadIconW.USER32(000000A4), ref: 00A0518E
                                                                  • Part of subcall function 00A0514C: LoadIconW.USER32(000000A2), ref: 00A051A0
                                                                  • Part of subcall function 00A0514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A051C6
                                                                  • Part of subcall function 00A0514C: RegisterClassExW.USER32(?), ref: 00A0521C
                                                                  • Part of subcall function 00A050DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A05109
                                                                  • Part of subcall function 00A050DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A0512A
                                                                  • Part of subcall function 00A050DB: ShowWindow.USER32(00000000), ref: 00A0513E
                                                                  • Part of subcall function 00A050DB: ShowWindow.USER32(00000000), ref: 00A05147
                                                                  • Part of subcall function 00A059D3: _memset.LIBCMT ref: 00A059F9
                                                                  • Part of subcall function 00A059D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A05A9E
                                                                Strings
                                                                • runas, xrefs: 00A40BE4
                                                                • AutoIt, xrefs: 00A40B23
                                                                • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00A40B28
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                • API String ID: 529118366-2030392706
                                                                • Opcode ID: f60a23e7a44e634cec33627f95eb4ad098d53de17d5a05034a51be421006e60a
                                                                • Instruction ID: 4b28d2aa17a96ce626fe4b35f702a1dbae865829f2e3d31ce828ae5103013457
                                                                • Opcode Fuzzy Hash: f60a23e7a44e634cec33627f95eb4ad098d53de17d5a05034a51be421006e60a
                                                                • Instruction Fuzzy Hash: 9351F031D0824CAACF01EBF4ED56EEE7B78AF99380F104165F551661E3DAB0094ADB21
                                                                APIs
                                                                • GetVersionExW.KERNEL32(?), ref: 00A05D40
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                • GetCurrentProcess.KERNEL32(?,00A80A18,00000000,00000000,?), ref: 00A05E07
                                                                • IsWow64Process.KERNEL32(00000000), ref: 00A05E0E
                                                                • GetNativeSystemInfo.KERNEL32(00000000), ref: 00A05E54
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00A05E5F
                                                                • GetSystemInfo.KERNEL32(00000000), ref: 00A05E90
                                                                • GetSystemInfo.KERNEL32(00000000), ref: 00A05E9C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                • String ID:
                                                                • API String ID: 1986165174-0
                                                                • Opcode ID: 6ec07a5c14f14ea4ab4e55e7020561627457f6618b2d1fad5db874d2636693d4
                                                                • Instruction ID: dcf9d53f2ec3836c94a6e2cff5057afeaadbeac4273bba3cfe4d27319cbbe300
                                                                • Opcode Fuzzy Hash: 6ec07a5c14f14ea4ab4e55e7020561627457f6618b2d1fad5db874d2636693d4
                                                                • Instruction Fuzzy Hash: F891D531949BC8DEC731CB7894545ABFFF56F79300B880A5ED0C793A81D230A688DB59
                                                                APIs
                                                                  • Part of subcall function 00A10284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A02A58,?,00008000), ref: 00A102A4
                                                                  • Part of subcall function 00A54FEC: GetFileAttributesW.KERNEL32(?,00A53BFE), ref: 00A54FED
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00A5407C
                                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 00A540CC
                                                                • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00A540DD
                                                                • FindClose.KERNEL32(00000000), ref: 00A540F4
                                                                • FindClose.KERNEL32(00000000), ref: 00A540FD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                • String ID: \*.*
                                                                • API String ID: 2649000838-1173974218
                                                                • Opcode ID: f142a1603f20b92b1388c095ae25255750eb156c14d9370223c63fcda1d918b0
                                                                • Instruction ID: 1500821a9a45edb39e88914cc1d24491cad1fee52398935974205a8a4ee4e885
                                                                • Opcode Fuzzy Hash: f142a1603f20b92b1388c095ae25255750eb156c14d9370223c63fcda1d918b0
                                                                • Instruction Fuzzy Hash: 5331A231008349ABC301EBA0D995CEFB7E8BE95315F400A2DF9D1821D2EB34D94DC762
                                                                APIs
                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00A5416D
                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00A5417B
                                                                • Process32NextW.KERNEL32(00000000,?), ref: 00A5419B
                                                                • CloseHandle.KERNEL32(00000000), ref: 00A54245
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 420147892-0
                                                                • Opcode ID: 47ad4c612279283a550bbce07684e407892bdd86c6b52d79878adc57c09bbb66
                                                                • Instruction ID: da994a7415d437ad9a43ed1d4ec9508caf7f2a8dde623728aa9ddc999a310069
                                                                • Opcode Fuzzy Hash: 47ad4c612279283a550bbce07684e407892bdd86c6b52d79878adc57c09bbb66
                                                                • Instruction Fuzzy Hash: 0931A4711083459FD300EF50E885AEFBBE8BF99355F40052DF585C21E1EB709989CB52
                                                                APIs
                                                                  • Part of subcall function 00A03740: CharUpperBuffW.USER32(?,00AB71DC,00000000,?,00000000,00AB71DC,?,009F53A5,?,?,?,?), ref: 00A0375D
                                                                • _memmove.LIBCMT ref: 009FB68A
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharUpper_memmove
                                                                • String ID:
                                                                • API String ID: 2819905725-0
                                                                • Opcode ID: c7f60f04ab041896225c1cfeddecba0a607cb4412a2c6bfd3295857e30517aff
                                                                • Instruction ID: 47c453c7b50c4349ca17f68e3434346ed082be275fe90b4ce1fd9b0107c001ea
                                                                • Opcode Fuzzy Hash: c7f60f04ab041896225c1cfeddecba0a607cb4412a2c6bfd3295857e30517aff
                                                                • Instruction Fuzzy Hash: 8CA287716083459FCB20DF18C480B6AB7E5BF88304F14896DFA9A8B361D775ED85CB92
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 2a8704fa594489f1f6ec39e0a69d645035fb494b2cdb7e15a12792a4b36d9392
                                                                • Instruction ID: 2573eed07c157f603f17931d2f3d07b2d871293111f182d95f1fdd3dc43770ba
                                                                • Opcode Fuzzy Hash: 2a8704fa594489f1f6ec39e0a69d645035fb494b2cdb7e15a12792a4b36d9392
                                                                • Instruction Fuzzy Hash: A922AA74E0420ACFDB24DF58C880BBEB7B4FF49300F148569EA56AB351E774A985CB91
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleMemoryProtectVirtual
                                                                • String ID:
                                                                • API String ID: 2407445808-0
                                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                • Instruction ID: f9b47937d168e1576482ed54476d5231ba883fe5c46c86502cb6f2a4416ec99a
                                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                • Instruction Fuzzy Hash: 9F31C571A00109DFD718DF59C5809A9FBB6FF59300B648AA5E409CB291E7B1EDC1CBC0
                                                                APIs
                                                                • timeGetTime.WINMM ref: 009FBF57
                                                                  • Part of subcall function 009F52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009F52E6
                                                                • Sleep.KERNEL32(0000000A,?,?), ref: 00A336B5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessagePeekSleepTimetime
                                                                • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                                                • API String ID: 1792118007-922114024
                                                                • Opcode ID: 971ae54a2bd6faa523b3e247b49dd9d769a842c2d5f93c621b42cb3e579aacba
                                                                • Instruction ID: 527d558149e7d64115622e778dcd275995885fe9074aa394f45f2451d83bb451
                                                                • Opcode Fuzzy Hash: 971ae54a2bd6faa523b3e247b49dd9d769a842c2d5f93c621b42cb3e579aacba
                                                                • Instruction Fuzzy Hash: DDC2C170608345DFDB28DF24C984BAAB7E4FF84304F14891DF69A972A1CB75E985CB42
                                                                APIs
                                                                • GetSysColorBrush.USER32(0000000F), ref: 009F3444
                                                                • RegisterClassExW.USER32(00000030), ref: 009F346E
                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009F347F
                                                                • InitCommonControlsEx.COMCTL32(?), ref: 009F349C
                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009F34AC
                                                                • LoadIconW.USER32(000000A9), ref: 009F34C2
                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009F34D1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                • API String ID: 2914291525-1005189915
                                                                • Opcode ID: 224292ebe1abb512a8a4bdd7e133ae29fd37e54fb8779befc5d7c976dabf31b2
                                                                • Instruction ID: 55c5cd0c78662ae6692037ffa98e32bb80cd0b703dbc2bb08f35dc3689a76591
                                                                • Opcode Fuzzy Hash: 224292ebe1abb512a8a4bdd7e133ae29fd37e54fb8779befc5d7c976dabf31b2
                                                                • Instruction Fuzzy Hash: A83114B184430AEFDB90DFE4E888BDDBBF0FB08310F10421AE590A62A1D3B51586CF91
                                                                APIs
                                                                • GetSysColorBrush.USER32(0000000F), ref: 009F3444
                                                                • RegisterClassExW.USER32(00000030), ref: 009F346E
                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009F347F
                                                                • InitCommonControlsEx.COMCTL32(?), ref: 009F349C
                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009F34AC
                                                                • LoadIconW.USER32(000000A9), ref: 009F34C2
                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009F34D1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                • API String ID: 2914291525-1005189915
                                                                • Opcode ID: 03c03c9c72e8afd7f397591560bd8e16b7eb99c254e94caa87796b088711a6aa
                                                                • Instruction ID: e5c5296fdf5eaaecc83e54382f7e85282e9eee746ba4d057490ebc14b62fb67a
                                                                • Opcode Fuzzy Hash: 03c03c9c72e8afd7f397591560bd8e16b7eb99c254e94caa87796b088711a6aa
                                                                • Instruction Fuzzy Hash: C221B2B1904219AFEB40DFE4EC89B9DBBF4FB08710F10421AF915A62A1D7B1558ACF91
                                                                APIs
                                                                  • Part of subcall function 00A100CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00A03094), ref: 00A100ED
                                                                  • Part of subcall function 00A108C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00A0309F), ref: 00A108E3
                                                                • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00A030E2
                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00A401BA
                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00A401FB
                                                                • RegCloseKey.ADVAPI32(?), ref: 00A40239
                                                                • _wcscat.LIBCMT ref: 00A40292
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                • API String ID: 2673923337-2727554177
                                                                • Opcode ID: 5c6c4fbc4e9c47b9bd05ae8accf6d92dd3477f9ac14ea0527f1222c204de904b
                                                                • Instruction ID: 5b331d3a1b2d30d71ed4c7f80c6c12f1bc4ec2375f51be3b24b9a817b61c0d06
                                                                • Opcode Fuzzy Hash: 5c6c4fbc4e9c47b9bd05ae8accf6d92dd3477f9ac14ea0527f1222c204de904b
                                                                • Instruction Fuzzy Hash: B4716C715093059EC704EFA9E9819EBBBECFF98340F40062EF555862B2EF709949CB52
                                                                APIs
                                                                • GetSysColorBrush.USER32(0000000F), ref: 00A05156
                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00A05165
                                                                • LoadIconW.USER32(00000063), ref: 00A0517C
                                                                • LoadIconW.USER32(000000A4), ref: 00A0518E
                                                                • LoadIconW.USER32(000000A2), ref: 00A051A0
                                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00A051C6
                                                                • RegisterClassExW.USER32(?), ref: 00A0521C
                                                                  • Part of subcall function 009F3411: GetSysColorBrush.USER32(0000000F), ref: 009F3444
                                                                  • Part of subcall function 009F3411: RegisterClassExW.USER32(00000030), ref: 009F346E
                                                                  • Part of subcall function 009F3411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009F347F
                                                                  • Part of subcall function 009F3411: InitCommonControlsEx.COMCTL32(?), ref: 009F349C
                                                                  • Part of subcall function 009F3411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009F34AC
                                                                  • Part of subcall function 009F3411: LoadIconW.USER32(000000A9), ref: 009F34C2
                                                                  • Part of subcall function 009F3411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009F34D1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                • String ID: #$0$AutoIt v3
                                                                • API String ID: 423443420-4155596026
                                                                • Opcode ID: 1fddc9380337111407ea1930677de128aea8a0649109bb9ed45a93c5155c8004
                                                                • Instruction ID: 17ec7987e766511ae3351c2a7c7f96600507b662903e0d09d808f37b8375202c
                                                                • Opcode Fuzzy Hash: 1fddc9380337111407ea1930677de128aea8a0649109bb9ed45a93c5155c8004
                                                                • Instruction Fuzzy Hash: 0A2137B1D04308AFEB11DFE4ED09B9D7BB4FB88710F00425AF604A62B2D7B659568F84
                                                                APIs
                                                                • WSAStartup.WS2_32(00000101,?), ref: 00A65E7E
                                                                • inet_addr.WSOCK32(?,?,?), ref: 00A65EC3
                                                                • gethostbyname.WS2_32(?), ref: 00A65ECF
                                                                • IcmpCreateFile.IPHLPAPI ref: 00A65EDD
                                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00A65F4D
                                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00A65F63
                                                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00A65FD8
                                                                • WSACleanup.WSOCK32 ref: 00A65FDE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                • String ID: Ping
                                                                • API String ID: 1028309954-2246546115
                                                                • Opcode ID: e340cafe476d385adcc9077d6d6acd44042e89f6e05674cd719c217919710c07
                                                                • Instruction ID: 74c128dd1177e4d958f4251ff836b7bf33da1f8c528dc3a6cee3156d3e2655fe
                                                                • Opcode Fuzzy Hash: e340cafe476d385adcc9077d6d6acd44042e89f6e05674cd719c217919710c07
                                                                • Instruction Fuzzy Hash: 4F515C31A046019FDB20EF65DD49F2AB7F4EF88720F144529FA96DB2A1DB70E905CB42
                                                                APIs
                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 00A04E22
                                                                • KillTimer.USER32(?,00000001), ref: 00A04E4C
                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A04E6F
                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00A04E7A
                                                                • CreatePopupMenu.USER32 ref: 00A04E8E
                                                                • PostQuitMessage.USER32(00000000), ref: 00A04EAF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                • String ID: TaskbarCreated
                                                                • API String ID: 129472671-2362178303
                                                                • Opcode ID: a2ce22916f940fe1ba979542d043883bc3ce2819b3bcd14104e7c1c9c46ddafd
                                                                • Instruction ID: 982ef872278ab13c7766fe4d86dc12b1316cdc2e8ff5afcb6397b3df4f8821e5
                                                                • Opcode Fuzzy Hash: a2ce22916f940fe1ba979542d043883bc3ce2819b3bcd14104e7c1c9c46ddafd
                                                                • Instruction Fuzzy Hash: 5D41E5B160860EABEB159FA4FD09BFE36A9FBC8340F040625F701911F3DAB49C51A761
                                                                APIs
                                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00A40C5B
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                • _memset.LIBCMT ref: 00A05787
                                                                • _wcscpy.LIBCMT ref: 00A057DB
                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A057EB
                                                                • __swprintf.LIBCMT ref: 00A40CD1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                                                • String ID: Line %d: $AutoIt -
                                                                • API String ID: 230667853-4094128768
                                                                • Opcode ID: 97321ca2a1714d20ced187d8d4541a7272bd06e024a5ab5d9003dba88a2f2d2f
                                                                • Instruction ID: 4f419797fa00387e3646cecb7841b57f0bcc918165827bd3765a330c3ff6d68a
                                                                • Opcode Fuzzy Hash: 97321ca2a1714d20ced187d8d4541a7272bd06e024a5ab5d9003dba88a2f2d2f
                                                                • Instruction Fuzzy Hash: B2419671408309AAD321EBA0ED85FDF77ECAF84350F104A1EF585920E2EB749649CB96
                                                                APIs
                                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00A05109
                                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00A0512A
                                                                • ShowWindow.USER32(00000000), ref: 00A0513E
                                                                • ShowWindow.USER32(00000000), ref: 00A05147
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$CreateShow
                                                                • String ID: AutoIt v3$edit
                                                                • API String ID: 1584632944-3779509399
                                                                • Opcode ID: 0422c4ca30151ba08e2aa5151db0568d86f62b9028e29e9e7c5b576fa8966c3c
                                                                • Instruction ID: b60966afb97d49403a0ee58438ece439f782be72b9ee85cbee99e2b204c1a990
                                                                • Opcode Fuzzy Hash: 0422c4ca30151ba08e2aa5151db0568d86f62b9028e29e9e7c5b576fa8966c3c
                                                                • Instruction Fuzzy Hash: 3FF0FE715452947EEB7197A76C4CEBB3E7DE7C6F50F00021EB900A22B2C6B11852DBB0
                                                                APIs
                                                                  • Part of subcall function 00A04A8C: _fseek.LIBCMT ref: 00A04AA4
                                                                  • Part of subcall function 00A59CF1: _wcscmp.LIBCMT ref: 00A59DE1
                                                                  • Part of subcall function 00A59CF1: _wcscmp.LIBCMT ref: 00A59DF4
                                                                • _free.LIBCMT ref: 00A59C5F
                                                                • _free.LIBCMT ref: 00A59C66
                                                                • _free.LIBCMT ref: 00A59CD1
                                                                  • Part of subcall function 00A12F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00A19C54,00000000,00A18D5D,00A159C3), ref: 00A12F99
                                                                  • Part of subcall function 00A12F85: GetLastError.KERNEL32(00000000,?,00A19C54,00000000,00A18D5D,00A159C3), ref: 00A12FAB
                                                                • _free.LIBCMT ref: 00A59CD9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                • String ID: >>>AUTOIT SCRIPT<<<
                                                                • API String ID: 1552873950-2806939583
                                                                • Opcode ID: 7b041d12b0a4872497cdd386667c04a1d7676e2088142deb2ff9b8edf2f914c3
                                                                • Instruction ID: bd3156433253170894e0c79f671f2578e5277f62fa7696b959d6b70c7d1224b3
                                                                • Opcode Fuzzy Hash: 7b041d12b0a4872497cdd386667c04a1d7676e2088142deb2ff9b8edf2f914c3
                                                                • Instruction Fuzzy Hash: E9515CB1E04218AFDF24DF64DD45AAEBBB9FF48304F00049EB649A7381DB715A948F58
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                • String ID:
                                                                • API String ID: 1559183368-0
                                                                • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                                • Instruction ID: b6e2948d0bfc911a149b0f689c21c15b82cd0a3093a253c56df8e5a084aba664
                                                                • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                                • Instruction Fuzzy Hash: CF519330E00B05DBDB249FB9D9856EE77B5AF81320F288B29F875962D0D7709DD09B80
                                                                APIs
                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009F52E6
                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009F534A
                                                                • TranslateMessage.USER32(?), ref: 009F5356
                                                                • DispatchMessageW.USER32(?), ref: 009F5360
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Message$Peek$DispatchTranslate
                                                                • String ID:
                                                                • API String ID: 1795658109-0
                                                                • Opcode ID: 4bda7c26340c4843ebde2dfe43169fe3a5d35a84ea931bdc3c5c4d04f633385a
                                                                • Instruction ID: 440fee1a706d750830fe535323ed24f5cc0a25b1445b5434d6a1fce43584ed58
                                                                • Opcode Fuzzy Hash: 4bda7c26340c4843ebde2dfe43169fe3a5d35a84ea931bdc3c5c4d04f633385a
                                                                • Instruction Fuzzy Hash: A731F43090870ADBEB30CBAC9C44FF977E89B41344F254569E722961E2D7F59886D711
                                                                APIs
                                                                • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,009F1275,SwapMouseButtons,00000004,?), ref: 009F12A8
                                                                • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,009F1275,SwapMouseButtons,00000004,?), ref: 009F12C9
                                                                • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,009F1275,SwapMouseButtons,00000004,?), ref: 009F12EB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID: Control Panel\Mouse
                                                                • API String ID: 3677997916-824357125
                                                                • Opcode ID: 57c768a56986adf2791966a11beab6b6ccef29466a4597f936413df1668e13f0
                                                                • Instruction ID: 3965be5401dcaa374e112e95678b5cb79f9ce39799781271764c64898146aa22
                                                                • Opcode Fuzzy Hash: 57c768a56986adf2791966a11beab6b6ccef29466a4597f936413df1668e13f0
                                                                • Instruction Fuzzy Hash: 2811337161020CFEDB208FA4D884EFEBBBCEF04744B104569E945D7220E2719E449BA0
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A05B58
                                                                  • Part of subcall function 00A056F8: _memset.LIBCMT ref: 00A05787
                                                                  • Part of subcall function 00A056F8: _wcscpy.LIBCMT ref: 00A057DB
                                                                  • Part of subcall function 00A056F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A057EB
                                                                • KillTimer.USER32(?,00000001,?,?), ref: 00A05BAD
                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00A05BBC
                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A40D7C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                • String ID:
                                                                • API String ID: 1378193009-0
                                                                • Opcode ID: 23d0804061c15e4302028cfbcd4d14a6838f9ce053fb69fdd97f54810c2461cb
                                                                • Instruction ID: 02d80593ec7413d3e5397d2adb4dd76c50b44953253946b585fcd1ded128a6e5
                                                                • Opcode Fuzzy Hash: 23d0804061c15e4302028cfbcd4d14a6838f9ce053fb69fdd97f54810c2461cb
                                                                • Instruction Fuzzy Hash: 1421F574D04B889FEB72CB749895FEBBFECAF42304F04048DE69A56181D3746989DB41
                                                                APIs
                                                                  • Part of subcall function 00A049C2: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00A027AF,?,00000001), ref: 00A049F4
                                                                • _free.LIBCMT ref: 00A3FB04
                                                                • _free.LIBCMT ref: 00A3FB4B
                                                                  • Part of subcall function 00A029BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00A02ADF
                                                                Strings
                                                                • Bad directive syntax error, xrefs: 00A3FB33
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _free$CurrentDirectoryLibraryLoad
                                                                • String ID: Bad directive syntax error
                                                                • API String ID: 2861923089-2118420937
                                                                • Opcode ID: 7980fa3272521139b6fadcb5b68e4588b43b25f5218f5094110ab8b77b68ff22
                                                                • Instruction ID: 58099b45349da2fc7ab27a5606720596c7645638e3ff7aa02a8bff27b599acf6
                                                                • Opcode Fuzzy Hash: 7980fa3272521139b6fadcb5b68e4588b43b25f5218f5094110ab8b77b68ff22
                                                                • Instruction Fuzzy Hash: DC916B71D10219AFCF04EFA4DD919EEB7B8BF09350F14456AF816AB2A1DB30AA45CB50
                                                                APIs
                                                                  • Part of subcall function 00A04AB2: __fread_nolock.LIBCMT ref: 00A04AD0
                                                                • _wcscmp.LIBCMT ref: 00A59DE1
                                                                • _wcscmp.LIBCMT ref: 00A59DF4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _wcscmp$__fread_nolock
                                                                • String ID: FILE
                                                                • API String ID: 4029003684-3121273764
                                                                • Opcode ID: f1a4ceba5063784ba6b3082e59188cc1475a3f30c0cc4f2423abdbffd7399a09
                                                                • Instruction ID: 412ecf5b2773906c379f1695cbf3bffd280595c543b495d786ba00ead1a4030f
                                                                • Opcode Fuzzy Hash: f1a4ceba5063784ba6b3082e59188cc1475a3f30c0cc4f2423abdbffd7399a09
                                                                • Instruction Fuzzy Hash: EF41B472A40209BADF21DBA4DC46FEF77BDEF49710F00446AFA00AB1C1D671994887A5
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A4032B
                                                                • GetOpenFileNameW.COMDLG32(?), ref: 00A40375
                                                                  • Part of subcall function 00A10284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A02A58,?,00008000), ref: 00A102A4
                                                                  • Part of subcall function 00A109C5: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00A109E4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Name$Path$FileFullLongOpen_memset
                                                                • String ID: X
                                                                • API String ID: 3777226403-3081909835
                                                                • Opcode ID: ae7562fad31aea7a79947b09d1a64fe04ca94599a7a0b2dc805ed5788f65d4ff
                                                                • Instruction ID: ac56488490b0bced4e8493e740a0e15aae343ee88aefed7788ecda3701325457
                                                                • Opcode Fuzzy Hash: ae7562fad31aea7a79947b09d1a64fe04ca94599a7a0b2dc805ed5788f65d4ff
                                                                • Instruction Fuzzy Hash: 89219371A0029C9BCF51DFD4D849BEE7BFC9F59304F00405AE504AB281DBB45A89DFA1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 77f1aa1c7e67fe6f7d89dd52ae967c1b641c489a2e85ee244bfd80c67eccda65
                                                                • Instruction ID: de7105444b95b09f7bb38fc8848349acfeca05ffebbfce7545c483a28537a590
                                                                • Opcode Fuzzy Hash: 77f1aa1c7e67fe6f7d89dd52ae967c1b641c489a2e85ee244bfd80c67eccda65
                                                                • Instruction Fuzzy Hash: 6CF13574A083049FC714DF28C584A6ABBF5FF88354F14892EF99A9B251DB30E945CF82
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memmove
                                                                • String ID:
                                                                • API String ID: 4104443479-0
                                                                • Opcode ID: c56a59336fd5587ef53fd3d7344cd487b26cda55964a65c3e9be459362767724
                                                                • Instruction ID: 2bc95ff25c36904413404f263e67447486b9449d41381f91cc7d760a484755e5
                                                                • Opcode Fuzzy Hash: c56a59336fd5587ef53fd3d7344cd487b26cda55964a65c3e9be459362767724
                                                                • Instruction Fuzzy Hash: 5F61DD71A0020DEBDF04CF29E981AAA7BB5FF44310F5481A9EC59CF295EB31D9A0CB50
                                                                APIs
                                                                  • Part of subcall function 00A0FF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00A74186,00000001,00A80980), ref: 00A0FFA7
                                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 009FAD08
                                                                • OleInitialize.OLE32(00000000), ref: 009FAD85
                                                                • CloseHandle.KERNEL32(00000000), ref: 00A32F56
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                                • String ID:
                                                                • API String ID: 3815369404-0
                                                                • Opcode ID: b4f75670e97fdfa378a951b37d4629e4baa9a883439af975d0464aa7549e563a
                                                                • Instruction ID: fae76fbd0dc64d10a7ded496501bfbdda662af7a557215cf9c2f8bb3bbdc481c
                                                                • Opcode Fuzzy Hash: b4f75670e97fdfa378a951b37d4629e4baa9a883439af975d0464aa7549e563a
                                                                • Instruction Fuzzy Hash: B441F2B09092408EC355EFA9FD54AAD7FE8EBD8311710876AE018D72B3EBB05487CB51
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A059F9
                                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00A05A9E
                                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00A05ABB
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: IconNotifyShell_$_memset
                                                                • String ID:
                                                                • API String ID: 1505330794-0
                                                                • Opcode ID: ac3d1543901f94f44be4dcd41f03a5ad33736142d1e63a2184c4ed16df7949bd
                                                                • Instruction ID: ec1e7ea25b62ff2b162dbacf62a540941ade96b162afc639dbfd124df7a4d8f4
                                                                • Opcode Fuzzy Hash: ac3d1543901f94f44be4dcd41f03a5ad33736142d1e63a2184c4ed16df7949bd
                                                                • Instruction Fuzzy Hash: A53152B0A057058FD760DF74E88869BBBF4FB88344F000A2EF69A86291D7B1A945CB51
                                                                APIs
                                                                • __FF_MSGBANNER.LIBCMT ref: 00A15953
                                                                  • Part of subcall function 00A1A39B: __NMSG_WRITE.LIBCMT ref: 00A1A3C2
                                                                  • Part of subcall function 00A1A39B: __NMSG_WRITE.LIBCMT ref: 00A1A3CC
                                                                • __NMSG_WRITE.LIBCMT ref: 00A1595A
                                                                  • Part of subcall function 00A1A3F8: GetModuleFileNameW.KERNEL32(00000000,00AB53BA,00000104,00000004,00000001,00A11003), ref: 00A1A48A
                                                                  • Part of subcall function 00A1A3F8: ___crtMessageBoxW.LIBCMT ref: 00A1A538
                                                                  • Part of subcall function 00A132CF: ___crtCorExitProcess.LIBCMT ref: 00A132D5
                                                                  • Part of subcall function 00A132CF: ExitProcess.KERNEL32 ref: 00A132DE
                                                                  • Part of subcall function 00A18D58: __getptd_noexit.LIBCMT ref: 00A18D58
                                                                • RtlAllocateHeap.NTDLL(01010000,00000000,00000001,?,00000004,?,?,00A11003,?), ref: 00A1597F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                • String ID:
                                                                • API String ID: 1372826849-0
                                                                • Opcode ID: b9504598fc5d3bc8b09101bc3fb420d8c659bebbd916d3da39e0f499ee745b0e
                                                                • Instruction ID: 5b892434245b7ff90df9a33d46c60704548589af64fb3a52556f0cfc2fd277d0
                                                                • Opcode Fuzzy Hash: b9504598fc5d3bc8b09101bc3fb420d8c659bebbd916d3da39e0f499ee745b0e
                                                                • Instruction Fuzzy Hash: 8101F536A02B01DBEA117B74AD02BEE32598F92770F540526F4149E1E1DEB48DC14B62
                                                                APIs
                                                                • _free.LIBCMT ref: 00A592D6
                                                                  • Part of subcall function 00A12F85: RtlFreeHeap.NTDLL(00000000,00000000,?,00A19C54,00000000,00A18D5D,00A159C3), ref: 00A12F99
                                                                  • Part of subcall function 00A12F85: GetLastError.KERNEL32(00000000,?,00A19C54,00000000,00A18D5D,00A159C3), ref: 00A12FAB
                                                                • _free.LIBCMT ref: 00A592E7
                                                                • _free.LIBCMT ref: 00A592F9
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                                • Instruction ID: 0c1931184c22eaec71634cb2abd283ec5adbd74575dd13a16d476d06ff4acfc2
                                                                • Opcode Fuzzy Hash: d545b8d0ab5e92762063c3ba8b14d4eaebd98453bfde93cefd35328ad8659e4d
                                                                • Instruction Fuzzy Hash: E8E0C2A120871293CA20A6387A44FD777EC1F88312F14040DB809DB146CE30E8A28228
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: CALL
                                                                • API String ID: 0-4196123274
                                                                • Opcode ID: 8fdb158144c62d9f0aaba3c949e08fc5d26687f92581061f43e4b2b2b7c6fa22
                                                                • Instruction ID: ea9f4ebbdba86315bc174253ddc305f60c9bf22d0e6b1e20d661c16d417fcffa
                                                                • Opcode Fuzzy Hash: 8fdb158144c62d9f0aaba3c949e08fc5d26687f92581061f43e4b2b2b7c6fa22
                                                                • Instruction Fuzzy Hash: 0D326A70608315DFC724DF18C580A6ABBE5BF84304F15896DFA8A9B362D735EC85CB82
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memmove
                                                                • String ID: EA06
                                                                • API String ID: 4104443479-3962188686
                                                                • Opcode ID: e84d5bad7277503e3428b0b3671f689365d86b32dae3f4ff7c27d0a230ac4c42
                                                                • Instruction ID: b3b01e724cc0811b5646be6b7b3edd1c20242f10675ba5bcb56bcf0e90fd73a3
                                                                • Opcode Fuzzy Hash: e84d5bad7277503e3428b0b3671f689365d86b32dae3f4ff7c27d0a230ac4c42
                                                                • Instruction Fuzzy Hash: 9A418BB1A0425C5BDF219B64AA51BBF7FB5AB5D340F584074EB82EB2C6C6308D8483E1
                                                                APIs
                                                                • _strcat.LIBCMT ref: 00A6E20C
                                                                  • Part of subcall function 009F4D37: __itow.LIBCMT ref: 009F4D62
                                                                  • Part of subcall function 009F4D37: __swprintf.LIBCMT ref: 009F4DAC
                                                                • _wcscpy.LIBCMT ref: 00A6E29B
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __itow__swprintf_strcat_wcscpy
                                                                • String ID:
                                                                • API String ID: 1012013722-0
                                                                • Opcode ID: 4f14097c3e34d8ff9a7b5df19dff6ca83f8f2c6609eef456be06600dcc746ea7
                                                                • Instruction ID: 8d2ef452f387ccb32d3a6ac083df19edc5df6d35438c797cfc5f5929c17e1240
                                                                • Opcode Fuzzy Hash: 4f14097c3e34d8ff9a7b5df19dff6ca83f8f2c6609eef456be06600dcc746ea7
                                                                • Instruction Fuzzy Hash: 1B913739A00604DFCB18DF28C5919A9B7F5FF99310B55805AE90A8F3A2DB30ED55CF81
                                                                APIs
                                                                • _memmove.LIBCMT ref: 00A568EC
                                                                • _memmove.LIBCMT ref: 00A5690A
                                                                  • Part of subcall function 00A56A73: _memmove.LIBCMT ref: 00A56B01
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memmove
                                                                • String ID:
                                                                • API String ID: 4104443479-0
                                                                • Opcode ID: cdc4ee5d02bcf24afdfa95328405049782ae6d8391ea2411472e0393a9e56d22
                                                                • Instruction ID: b469ba61100f2332ac77f0b995bbf453573acbc0e9bac8f26975ba0895299211
                                                                • Opcode Fuzzy Hash: cdc4ee5d02bcf24afdfa95328405049782ae6d8391ea2411472e0393a9e56d22
                                                                • Instruction Fuzzy Hash: 8871B070600604DFCB249F14D845BBAB7B5FF94366F68C508EED52B282CB35AD49CB90
                                                                APIs
                                                                • CharLowerBuffW.USER32(?,?), ref: 00A5614E
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharLower
                                                                • String ID:
                                                                • API String ID: 2358735015-0
                                                                • Opcode ID: 9e2fecc8f9efb0462833687627b2b395fdbd019a21b6431bb7b8263714de2b37
                                                                • Instruction ID: 917845ab95b816d865b2d2fb9946144ff0f5adef9c15c4c4d742ebe6d0a49c98
                                                                • Opcode Fuzzy Hash: 9e2fecc8f9efb0462833687627b2b395fdbd019a21b6431bb7b8263714de2b37
                                                                • Instruction Fuzzy Hash: 2B41D5B6A006099FDB11DFA8C8818FEB3B8FB54351F50462EE91687281EB70DE49CB50
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memmove
                                                                • String ID:
                                                                • API String ID: 4104443479-0
                                                                • Opcode ID: 38d8ba0eddc5ffd21b23cc36f4ebc13a59a0bc904e0ecf5c1280ddf31e3f492e
                                                                • Instruction ID: f5cea250acac581e22d502f5e6fbae4c68590fc5841473af098c69a563b14255
                                                                • Opcode Fuzzy Hash: 38d8ba0eddc5ffd21b23cc36f4ebc13a59a0bc904e0ecf5c1280ddf31e3f492e
                                                                • Instruction Fuzzy Hash: 6341B9725083099FC710EFA8E983DBEB7B8FF49341B244599FA85A7281DB719C45CB60
                                                                APIs
                                                                • IsThemeActive.UXTHEME ref: 00A05FEF
                                                                  • Part of subcall function 00A1359C: __lock.LIBCMT ref: 00A135A2
                                                                  • Part of subcall function 00A1359C: DecodePointer.KERNEL32(00000001,?,00A06004,00A48892), ref: 00A135AE
                                                                  • Part of subcall function 00A1359C: EncodePointer.KERNEL32(?,?,00A06004,00A48892), ref: 00A135B9
                                                                  • Part of subcall function 00A05F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00A05F18
                                                                  • Part of subcall function 00A05F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00A05F2D
                                                                  • Part of subcall function 00A05240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A0526C
                                                                  • Part of subcall function 00A05240: IsDebuggerPresent.KERNEL32 ref: 00A0527E
                                                                  • Part of subcall function 00A05240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 00A052E6
                                                                  • Part of subcall function 00A05240: SetCurrentDirectoryW.KERNEL32(?), ref: 00A05366
                                                                • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 00A0602F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                • String ID:
                                                                • API String ID: 1438897964-0
                                                                • Opcode ID: f1c25b35bf83cc32e57f1ef4257f2042da739541b8610a77b3f902a2769f3ee4
                                                                • Instruction ID: 2a026754bf05c8786f21d497e098fde0b78e520e7c9c4ddcd56fa5c78c1e3446
                                                                • Opcode Fuzzy Hash: f1c25b35bf83cc32e57f1ef4257f2042da739541b8610a77b3f902a2769f3ee4
                                                                • Instruction Fuzzy Hash: 10118CB18083059BC710DFA8ED4595FBBE8EFC8710F004A1AF154872B2DBB09946CB92
                                                                APIs
                                                                  • Part of subcall function 00A1593C: __FF_MSGBANNER.LIBCMT ref: 00A15953
                                                                  • Part of subcall function 00A1593C: __NMSG_WRITE.LIBCMT ref: 00A1595A
                                                                  • Part of subcall function 00A1593C: RtlAllocateHeap.NTDLL(01010000,00000000,00000001,?,00000004,?,?,00A11003,?), ref: 00A1597F
                                                                • std::exception::exception.LIBCMT ref: 00A1101C
                                                                • __CxxThrowException@8.LIBCMT ref: 00A11031
                                                                  • Part of subcall function 00A187CB: RaiseException.KERNEL32(?,?,?,00AACAF8,?,?,?,?,?,00A11036,?,00AACAF8,?,00000001), ref: 00A18820
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                • String ID:
                                                                • API String ID: 3902256705-0
                                                                • Opcode ID: 6a5ed7ce911fcae46fa74829d8802a2d43687a06a445e3adae5ea9ab140e674e
                                                                • Instruction ID: 9c2f62c503e7851594d784d3ef506373ca00428721a8e89d34dca61af56a3553
                                                                • Opcode Fuzzy Hash: 6a5ed7ce911fcae46fa74829d8802a2d43687a06a445e3adae5ea9ab140e674e
                                                                • Instruction Fuzzy Hash: F2F0C83690421DB6CF20BB69ED16DEE77AC9F05750F100455F914962D1EFB18BC1C2E5
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __lock_file_memset
                                                                • String ID:
                                                                • API String ID: 26237723-0
                                                                • Opcode ID: 1005701a058f7930f54328227b0965af83cbc6423dcd6bc9ad249d14eb652d66
                                                                • Instruction ID: c15c18ea5bc21e87f3d7b994d453f64ebc231ca22fa9d8d00df78289833b4ee1
                                                                • Opcode Fuzzy Hash: 1005701a058f7930f54328227b0965af83cbc6423dcd6bc9ad249d14eb652d66
                                                                • Instruction Fuzzy Hash: 07014471C00749EBCF11AF7ACD019DE7B71AFC0360F184115B8245B1A1D7358A91EF91
                                                                APIs
                                                                  • Part of subcall function 00A18D58: __getptd_noexit.LIBCMT ref: 00A18D58
                                                                • __lock_file.LIBCMT ref: 00A1560B
                                                                  • Part of subcall function 00A16E3E: __lock.LIBCMT ref: 00A16E61
                                                                • __fclose_nolock.LIBCMT ref: 00A15616
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                • String ID:
                                                                • API String ID: 2800547568-0
                                                                • Opcode ID: 90e118e9c26878f2e79063cbb91c50fffebf7cd04934c0538160d90bd3544772
                                                                • Instruction ID: e87e53af0ee6d0e82da35d217aa43680b979155a04f653e7b5894ae74105ea01
                                                                • Opcode Fuzzy Hash: 90e118e9c26878f2e79063cbb91c50fffebf7cd04934c0538160d90bd3544772
                                                                • Instruction Fuzzy Hash: 32F0B471C05B05DBD7106F7989027EE77E26F81330F15820AB428AB1C1CBBC4AC19F55
                                                                APIs
                                                                • __lock_file.LIBCMT ref: 00A15EB4
                                                                • __ftell_nolock.LIBCMT ref: 00A15EBF
                                                                  • Part of subcall function 00A18D58: __getptd_noexit.LIBCMT ref: 00A18D58
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                                • String ID:
                                                                • API String ID: 2999321469-0
                                                                • Opcode ID: 0e23dbd5ef1c5c7dc1efe2b1c19d68fd17467c3dbf30614194073983fecb93bb
                                                                • Instruction ID: b5723c4b6c0da650b69b3f5924cbe24fa2f469de3aec6bf1fd9da9209c8bb2e2
                                                                • Opcode Fuzzy Hash: 0e23dbd5ef1c5c7dc1efe2b1c19d68fd17467c3dbf30614194073983fecb93bb
                                                                • Instruction Fuzzy Hash: FFF0A031D55715EADB00BB788A037DE72A06F81331F214206B424AB1C2CF7C8AC29A95
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A05AEF
                                                                • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00A05B1F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: IconNotifyShell__memset
                                                                • String ID:
                                                                • API String ID: 928536360-0
                                                                • Opcode ID: b9bdea8cf943d1563d6fa4beca718a37d14b0fae87c0ca0c0e9e5a42a90c8867
                                                                • Instruction ID: cc4084cd6f03f01059d3a70c286684eb7abce2a19a27439c98df6c7df54ca107
                                                                • Opcode Fuzzy Hash: b9bdea8cf943d1563d6fa4beca718a37d14b0fae87c0ca0c0e9e5a42a90c8867
                                                                • Instruction Fuzzy Hash: C5F0A7719183089FD7A2CFA4DC457DA7BBC9B01308F0002E9EA48962A2D7B14B89CF51
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: LoadString$__swprintf
                                                                • String ID:
                                                                • API String ID: 207118244-0
                                                                • Opcode ID: 462e02669e37121799a5bf56188d563e3a2aa0ebbd9549f378b8e23e50ecda7f
                                                                • Instruction ID: e4c2e1e342aebca87837dede858d2eebc69d101fa6f10f71ba46c6e37bb559f6
                                                                • Opcode Fuzzy Hash: 462e02669e37121799a5bf56188d563e3a2aa0ebbd9549f378b8e23e50ecda7f
                                                                • Instruction Fuzzy Hash: F0B15B35A0010AEFCB14DF98D891DFEB7B5FF48720F10811AF916AB291EB70A945CB90
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d3171ba3b905bcb7b6a6de5e97d8fbf2276e8d3b99eb9c82fa3538bfa3562425
                                                                • Instruction ID: 750baa023007c8e409382442bf28e38da6c8f11104f26263421c6a03efbd955c
                                                                • Opcode Fuzzy Hash: d3171ba3b905bcb7b6a6de5e97d8fbf2276e8d3b99eb9c82fa3538bfa3562425
                                                                • Instruction Fuzzy Hash: 6A61CCB060020ADFDB10DF54C981B7AB7F9EF44350F11856DEA1A9B291D7B8ED80CB52
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memmove
                                                                • String ID:
                                                                • API String ID: 4104443479-0
                                                                • Opcode ID: 7a9628b4677101286da96b24158057784d4e543a3e092ee71b03b5c8c780e813
                                                                • Instruction ID: 354ca8e5f80b91dcca7a094457932e2b54b5cb40251ff24841c53ae6ac502cd1
                                                                • Opcode Fuzzy Hash: 7a9628b4677101286da96b24158057784d4e543a3e092ee71b03b5c8c780e813
                                                                • Instruction Fuzzy Hash: 8131D47A604606DFCB24DF18E450A21F7B8FF08310714C56AE98A8F7A1D770EC81CB80
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ClearVariant
                                                                • String ID:
                                                                • API String ID: 1473721057-0
                                                                • Opcode ID: 7916d7af3864f8c0614a6e9bd67cbe3d48f63980985c8afcabf156901673f9df
                                                                • Instruction ID: 708f4ecee080a49a39cfe286b0d0f785ad110472e14623b1b777e3134b9dd4bb
                                                                • Opcode Fuzzy Hash: 7916d7af3864f8c0614a6e9bd67cbe3d48f63980985c8afcabf156901673f9df
                                                                • Instruction Fuzzy Hash: 36413B74508355DFDB14DF18C584B2ABBE1BF45308F0989ACE9898B362C331EC85CB52
                                                                APIs
                                                                  • Part of subcall function 00A04B29: FreeLibrary.KERNEL32(00000000,?), ref: 00A04B63
                                                                  • Part of subcall function 00A1547B: __wfsopen.LIBCMT ref: 00A15486
                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00A027AF,?,00000001), ref: 00A049F4
                                                                  • Part of subcall function 00A04ADE: FreeLibrary.KERNEL32(00000000), ref: 00A04B18
                                                                  • Part of subcall function 00A048B0: _memmove.LIBCMT ref: 00A048FA
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Library$Free$Load__wfsopen_memmove
                                                                • String ID:
                                                                • API String ID: 1396898556-0
                                                                • Opcode ID: c0d33223aef6e3795a3dda4fc4003a67744de1456b19e98ed7a4eb5f6ba338f1
                                                                • Instruction ID: ed4830b2bf4d70cd9575a111fddd91168d2f4baf1e33b71faee2a48d962aad9e
                                                                • Opcode Fuzzy Hash: c0d33223aef6e3795a3dda4fc4003a67744de1456b19e98ed7a4eb5f6ba338f1
                                                                • Instruction Fuzzy Hash: AB11277275020DABDB10FB74DE02FAE77A9AF48741F108429F641AA1C1EA708A04A794
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memmove
                                                                • String ID:
                                                                • API String ID: 4104443479-0
                                                                • Opcode ID: 25aaaec36362d06fb08d722cb288e75b5f547c46fb5771c96884fc2fb0937184
                                                                • Instruction ID: 43647b8e2c6f6a3b337e5123e701c504f1e832e24454e5b455810830711c658d
                                                                • Opcode Fuzzy Hash: 25aaaec36362d06fb08d722cb288e75b5f547c46fb5771c96884fc2fb0937184
                                                                • Instruction Fuzzy Hash: FA115B76604605DFD724CF28E581956F7F9FF49354B20C82EE88ACB2A1E732E881CB50
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ClearVariant
                                                                • String ID:
                                                                • API String ID: 1473721057-0
                                                                • Opcode ID: 3df46e8315cc99439de39af705184afe44a5d3ab04a0cb410e6af732624d1666
                                                                • Instruction ID: 8441254fe320a3d0726c6fbde6c1f1a0519420556757f5ea65a08f25a9bc2f79
                                                                • Opcode Fuzzy Hash: 3df46e8315cc99439de39af705184afe44a5d3ab04a0cb410e6af732624d1666
                                                                • Instruction Fuzzy Hash: 23211374A08355DFCB54DF14C544B6ABBE4BF88304F05896CFA8A97322C331E849CB92
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memmove
                                                                • String ID:
                                                                • API String ID: 4104443479-0
                                                                • Opcode ID: 8565a2e206dddf4350968ef93c696b5c539dc39c822a590dc04b60a48f516eb7
                                                                • Instruction ID: d6afe5ddb90f452b66414a2e49d8c76144515a5796aa0594578f65f499295bce
                                                                • Opcode Fuzzy Hash: 8565a2e206dddf4350968ef93c696b5c539dc39c822a590dc04b60a48f516eb7
                                                                • Instruction Fuzzy Hash: 7201F9727017056ED3245F38ED06FA7BBA8DB447E0F50852EF65ACA1D1EB71E49087A0
                                                                APIs
                                                                • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 00A64998
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: EnvironmentVariable
                                                                • String ID:
                                                                • API String ID: 1431749950-0
                                                                • Opcode ID: f98188059ce1278114d03647e6b2922ccc257ca92b259ba4f09b113bddafb8fb
                                                                • Instruction ID: 80c360d277d1c4db2e8965365cbd3a89750807af3427f08e7d7630c2d009f4b5
                                                                • Opcode Fuzzy Hash: f98188059ce1278114d03647e6b2922ccc257ca92b259ba4f09b113bddafb8fb
                                                                • Instruction Fuzzy Hash: 45F04475608208AFCB14FB65D946CAF7BBCEF49320B004155F9049B291EE70BD81C751
                                                                APIs
                                                                  • Part of subcall function 00A10FE6: std::exception::exception.LIBCMT ref: 00A1101C
                                                                  • Part of subcall function 00A10FE6: __CxxThrowException@8.LIBCMT ref: 00A11031
                                                                • _memset.LIBCMT ref: 00A57CB4
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Exception@8Throw_memsetstd::exception::exception
                                                                • String ID:
                                                                • API String ID: 525207782-0
                                                                • Opcode ID: 3ecc4d077f8347220a40a240f02962e6a21ded5fff4d928bb21853c154afc254
                                                                • Instruction ID: 2b5475c121d6f3b13a66e3ad65984dc221b18f66f061b9a081c27515ede30e4d
                                                                • Opcode Fuzzy Hash: 3ecc4d077f8347220a40a240f02962e6a21ded5fff4d928bb21853c154afc254
                                                                • Instruction Fuzzy Hash: 0301F6752042049FD321EF5CD542F4ABBE1AF5D310F25845AF5888B392DBB2E881CB90
                                                                APIs
                                                                  • Part of subcall function 00A10FE6: std::exception::exception.LIBCMT ref: 00A1101C
                                                                  • Part of subcall function 00A10FE6: __CxxThrowException@8.LIBCMT ref: 00A11031
                                                                • _memmove.LIBCMT ref: 00A2DC8B
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Exception@8Throw_memmovestd::exception::exception
                                                                • String ID:
                                                                • API String ID: 1602317333-0
                                                                • Opcode ID: 45a849d2a6824c2a98c98ed0063ef32583db97a8290c264e89d73d06c63a9186
                                                                • Instruction ID: c87103de96a29e3de736a7dd795662e8a7268c023cb726b007b6f2c473e8026b
                                                                • Opcode Fuzzy Hash: 45a849d2a6824c2a98c98ed0063ef32583db97a8290c264e89d73d06c63a9186
                                                                • Instruction Fuzzy Hash: 81F01274604101DFD710DF6CC642E55BBE1BF1D300B25845CE1998B352E773D891CB91
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _fseek
                                                                • String ID:
                                                                • API String ID: 2937370855-0
                                                                • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                                • Instruction ID: fa1ce42895aa50da5bc2153a0e723498e7b455789724c18e66bc1033881df5de
                                                                • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                                • Instruction Fuzzy Hash: 77F08CB6500208FFDF108F54DC04CEB7B79EF89320F00459CF9045A111D232EA619BA0
                                                                APIs
                                                                • FreeLibrary.KERNEL32(?,?,?,00A027AF,?,00000001), ref: 00A04A63
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: FreeLibrary
                                                                • String ID:
                                                                • API String ID: 3664257935-0
                                                                • Opcode ID: cd7f3f4dd87bc1631b2ff3dd21a7df3e315e98860e4049072b88a4b76c29184d
                                                                • Instruction ID: feb8e418c4d7a8ae89a53132f431ee2f4e9d311c8053b87b987b5184f98554e0
                                                                • Opcode Fuzzy Hash: cd7f3f4dd87bc1631b2ff3dd21a7df3e315e98860e4049072b88a4b76c29184d
                                                                • Instruction Fuzzy Hash: 6EF015B1645705CFCB349F64E494816BBF5BF983A53208A2EE2D683650C731A984DB54
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __fread_nolock
                                                                • String ID:
                                                                • API String ID: 2638373210-0
                                                                • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                                • Instruction ID: 8b41e12020c33aa262ac7741958e80894f85c64f19c55b6941dadcdbdb6039bf
                                                                • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                                • Instruction Fuzzy Hash: C7F0587640020DFFDF04DF90C941EAABB79FB08314F208189F9198A212D336DA21AB90
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ClearVariant
                                                                • String ID:
                                                                • API String ID: 1473721057-0
                                                                • Opcode ID: d8fb7b1be5355a24cef1e799e096cc20d8a0b4c741d6fb3133ebe76757589c68
                                                                • Instruction ID: 9d8a560f01878e2fb2b7e4dd5f205a4bad8d01948138fe873335bcd997747e6c
                                                                • Opcode Fuzzy Hash: d8fb7b1be5355a24cef1e799e096cc20d8a0b4c741d6fb3133ebe76757589c68
                                                                • Instruction Fuzzy Hash: 90E022B1B0834A9FE730DBA9A414F32FBE8AB00310F10452AE599C1240E37698A497A1
                                                                APIs
                                                                • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00A109E4
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: LongNamePath_memmove
                                                                • String ID:
                                                                • API String ID: 2514874351-0
                                                                • Opcode ID: a22c34e27b82f7f0fa942cf454fefded9a8d440191dc8bf03cb6a030eb247873
                                                                • Instruction ID: 533176f49976954fd13292b49b182880108e9f63023e16ef1873eb037cdad5c1
                                                                • Opcode Fuzzy Hash: a22c34e27b82f7f0fa942cf454fefded9a8d440191dc8bf03cb6a030eb247873
                                                                • Instruction Fuzzy Hash: EBE0CD3290012857C721E69CAC05FEE77EDDF89790F0441B6FC0CD7344D9649D8586D1
                                                                APIs
                                                                • GetFileAttributesW.KERNEL32(?,00A53BFE), ref: 00A54FED
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: fef377b8a41045772d1962790befa66c4398c4ebaf489dbf7ba463dd25cd8d00
                                                                • Instruction ID: de2bea17638f3e3fa0adfcff402bb779a0d9fca1364772e070a956fba05ee3f7
                                                                • Opcode Fuzzy Hash: fef377b8a41045772d1962790befa66c4398c4ebaf489dbf7ba463dd25cd8d00
                                                                • Instruction Fuzzy Hash: 94B09234000680769D681F3C194C8993301684ABBE7D81B81E878854E59239888FE720
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __wfsopen
                                                                • String ID:
                                                                • API String ID: 197181222-0
                                                                • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                • Instruction ID: 0d11ad9628d7e152edc1576c2bc3e62233026662f5e047cd6f167ea8b3ef1101
                                                                • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                • Instruction Fuzzy Hash: E6B0927684020CB7CE012A92EC03A993B2A9B84668F408020FB0C1C162A673A6A09689
                                                                APIs
                                                                  • Part of subcall function 00A54005: FindFirstFileW.KERNEL32(?,?), ref: 00A5407C
                                                                  • Part of subcall function 00A54005: DeleteFileW.KERNEL32(?,?,?,?), ref: 00A540CC
                                                                  • Part of subcall function 00A54005: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00A540DD
                                                                  • Part of subcall function 00A54005: FindClose.KERNEL32(00000000), ref: 00A540F4
                                                                • GetLastError.KERNEL32 ref: 00A5C292
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                                • String ID:
                                                                • API String ID: 2191629493-0
                                                                • Opcode ID: 30cf17ae3d0e2edb2a19fc5205cba0832fe1fe5e58538870e64be469fcc207ee
                                                                • Instruction ID: 13099d1d0fd02178f333cb856018cc723f1bbd623d4b9ae4898aeb888ba54e5d
                                                                • Opcode Fuzzy Hash: 30cf17ae3d0e2edb2a19fc5205cba0832fe1fe5e58538870e64be469fcc207ee
                                                                • Instruction Fuzzy Hash: A7F082312102148FCB10EF59D840F6AB7E5BF88324F058019FA099B392CB74BC01CB94
                                                                APIs
                                                                  • Part of subcall function 009F29E2: GetWindowLongW.USER32(?,000000EB), ref: 009F29F3
                                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00A7D208
                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A7D249
                                                                • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00A7D28E
                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A7D2B8
                                                                • SendMessageW.USER32 ref: 00A7D2E1
                                                                • _wcsncpy.LIBCMT ref: 00A7D359
                                                                • GetKeyState.USER32(00000011), ref: 00A7D37A
                                                                • GetKeyState.USER32(00000009), ref: 00A7D387
                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A7D39D
                                                                • GetKeyState.USER32(00000010), ref: 00A7D3A7
                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A7D3D0
                                                                • SendMessageW.USER32 ref: 00A7D3F7
                                                                • SendMessageW.USER32(?,00001030,?,00A7B9BA), ref: 00A7D4FD
                                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00A7D513
                                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00A7D526
                                                                • SetCapture.USER32(?), ref: 00A7D52F
                                                                • ClientToScreen.USER32(?,?), ref: 00A7D594
                                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00A7D5A1
                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A7D5BB
                                                                • ReleaseCapture.USER32 ref: 00A7D5C6
                                                                • GetCursorPos.USER32(?), ref: 00A7D600
                                                                • ScreenToClient.USER32(?,?), ref: 00A7D60D
                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A7D669
                                                                • SendMessageW.USER32 ref: 00A7D697
                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A7D6D4
                                                                • SendMessageW.USER32 ref: 00A7D703
                                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A7D724
                                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00A7D733
                                                                • GetCursorPos.USER32(?), ref: 00A7D753
                                                                • ScreenToClient.USER32(?,?), ref: 00A7D760
                                                                • GetParent.USER32(?), ref: 00A7D780
                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A7D7E9
                                                                • SendMessageW.USER32 ref: 00A7D81A
                                                                • ClientToScreen.USER32(?,?), ref: 00A7D878
                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00A7D8A8
                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A7D8D2
                                                                • SendMessageW.USER32 ref: 00A7D8F5
                                                                • ClientToScreen.USER32(?,?), ref: 00A7D947
                                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00A7D97B
                                                                  • Part of subcall function 009F29AB: GetWindowLongW.USER32(?,000000EB), ref: 009F29BC
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A7DA17
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                • String ID: @GUI_DRAGID$F
                                                                • API String ID: 3977979337-4164748364
                                                                • Opcode ID: 5e6210c9f0fbe584d2c631a25e02415fb5cd1e690353b3e58d7dced222444433
                                                                • Instruction ID: caa5ff9658946f7ab5bc86b05718e44734ba68c50a8325b4dac6d70cdd5878e0
                                                                • Opcode Fuzzy Hash: 5e6210c9f0fbe584d2c631a25e02415fb5cd1e690353b3e58d7dced222444433
                                                                • Instruction Fuzzy Hash: 27428B30205241AFD725DF68CC48FAABBF5FF88310F148619F699872A1D7B1E855CB92
                                                                APIs
                                                                  • Part of subcall function 00A49399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A493E3
                                                                  • Part of subcall function 00A49399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A49410
                                                                  • Part of subcall function 00A49399: GetLastError.KERNEL32 ref: 00A4941D
                                                                • _memset.LIBCMT ref: 00A48F71
                                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00A48FC3
                                                                • CloseHandle.KERNEL32(?), ref: 00A48FD4
                                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A48FEB
                                                                • GetProcessWindowStation.USER32 ref: 00A49004
                                                                • SetProcessWindowStation.USER32(00000000), ref: 00A4900E
                                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00A49028
                                                                  • Part of subcall function 00A48DE9: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A48F27), ref: 00A48DFE
                                                                  • Part of subcall function 00A48DE9: CloseHandle.KERNEL32(?,?,00A48F27), ref: 00A48E10
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                • String ID: $default$winsta0
                                                                • API String ID: 2063423040-1027155976
                                                                • Opcode ID: 6f6af429cec65c776209602296bccb187749a37b17ac44bcb20859ae45f06d14
                                                                • Instruction ID: 4d5e262096c1a080867e521f96f66ef71360f1ce694ab98da7b694d94e5ba267
                                                                • Opcode Fuzzy Hash: 6f6af429cec65c776209602296bccb187749a37b17ac44bcb20859ae45f06d14
                                                                • Instruction Fuzzy Hash: A5815975900209BFDF51DFA8DD49EEF7B79AF48314F044229F914A6261D7318E29DB20
                                                                APIs
                                                                • OpenClipboard.USER32(00A80980), ref: 00A6465C
                                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 00A6466A
                                                                • GetClipboardData.USER32(0000000D), ref: 00A64672
                                                                • CloseClipboard.USER32 ref: 00A6467E
                                                                • GlobalLock.KERNEL32(00000000), ref: 00A6469A
                                                                • CloseClipboard.USER32 ref: 00A646A4
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00A646B9
                                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 00A646C6
                                                                • GetClipboardData.USER32(00000001), ref: 00A646CE
                                                                • GlobalLock.KERNEL32(00000000), ref: 00A646DB
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00A6470F
                                                                • CloseClipboard.USER32 ref: 00A6481F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                                • String ID:
                                                                • API String ID: 3222323430-0
                                                                • Opcode ID: e507608676bfe8bb9a78bb92fcc064bd7b756777e1765af681529b65d91a9f7f
                                                                • Instruction ID: fbf5f80930c576da56a886c762ce6cf045946394e86bc1651db04d45dd8f78e4
                                                                • Opcode Fuzzy Hash: e507608676bfe8bb9a78bb92fcc064bd7b756777e1765af681529b65d91a9f7f
                                                                • Instruction Fuzzy Hash: 5051A475244205AFD341EFA0DD85FAE77B8AF88B50F004529F656D31E2EF70D9098B62
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00A5CDD0
                                                                • FindClose.KERNEL32(00000000), ref: 00A5CE24
                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A5CE49
                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A5CE60
                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A5CE87
                                                                • __swprintf.LIBCMT ref: 00A5CED3
                                                                • __swprintf.LIBCMT ref: 00A5CF16
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                • __swprintf.LIBCMT ref: 00A5CF6A
                                                                  • Part of subcall function 00A138C8: __woutput_l.LIBCMT ref: 00A13921
                                                                • __swprintf.LIBCMT ref: 00A5CFB8
                                                                  • Part of subcall function 00A138C8: __flsbuf.LIBCMT ref: 00A13943
                                                                  • Part of subcall function 00A138C8: __flsbuf.LIBCMT ref: 00A1395B
                                                                • __swprintf.LIBCMT ref: 00A5D007
                                                                • __swprintf.LIBCMT ref: 00A5D056
                                                                • __swprintf.LIBCMT ref: 00A5D0A5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                • API String ID: 3953360268-2428617273
                                                                • Opcode ID: fcd8910454b94bb5d49687bfbe536684cdfc17d6b926d10bbfa5b3fc4a9c50f7
                                                                • Instruction ID: daae248b167212d766006723371b1fb94eae3a0d536ba466a8505f721aa68300
                                                                • Opcode Fuzzy Hash: fcd8910454b94bb5d49687bfbe536684cdfc17d6b926d10bbfa5b3fc4a9c50f7
                                                                • Instruction Fuzzy Hash: 40A130B2404309ABD710EFA4DD85EAFB7ECFF94705F400919F69586191EB70EA08CB62
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00A5F5F9
                                                                • _wcscmp.LIBCMT ref: 00A5F60E
                                                                • _wcscmp.LIBCMT ref: 00A5F625
                                                                • GetFileAttributesW.KERNEL32(?), ref: 00A5F637
                                                                • SetFileAttributesW.KERNEL32(?,?), ref: 00A5F651
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00A5F669
                                                                • FindClose.KERNEL32(00000000), ref: 00A5F674
                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00A5F690
                                                                • _wcscmp.LIBCMT ref: 00A5F6B7
                                                                • _wcscmp.LIBCMT ref: 00A5F6CE
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A5F6E0
                                                                • SetCurrentDirectoryW.KERNEL32(00AAB578), ref: 00A5F6FE
                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A5F708
                                                                • FindClose.KERNEL32(00000000), ref: 00A5F715
                                                                • FindClose.KERNEL32(00000000), ref: 00A5F727
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                • String ID: *.*
                                                                • API String ID: 1803514871-438819550
                                                                • Opcode ID: 6351cab5ec17aa897c38b5e0dd56a257f7426f80bf747fafda5bd0eb63f808c1
                                                                • Instruction ID: 0cbe2121d4c43920ab51c1970db25b4f27bd16059ce5036a1738b8e0bf28ddd4
                                                                • Opcode Fuzzy Hash: 6351cab5ec17aa897c38b5e0dd56a257f7426f80bf747fafda5bd0eb63f808c1
                                                                • Instruction Fuzzy Hash: DF316272941219AEDF50DBB49C4DEEE77ACBF09322F100565E945D31A0EB70DA89CB60
                                                                APIs
                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A70FB3
                                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00A80980,00000000,?,00000000,?,?), ref: 00A71021
                                                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00A71069
                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00A710F2
                                                                • RegCloseKey.ADVAPI32(?), ref: 00A71412
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00A7141F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Close$ConnectCreateRegistryValue
                                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                • API String ID: 536824911-966354055
                                                                • Opcode ID: af1d48d305e75743e0c65afb5864d27b1bfce87f6c21fbff0860581849b940c2
                                                                • Instruction ID: ee2e89b0a7dba5f9bcf54c7b8ed9319635dbcf2fa39241afa65bebb64446cbde
                                                                • Opcode Fuzzy Hash: af1d48d305e75743e0c65afb5864d27b1bfce87f6c21fbff0860581849b940c2
                                                                • Instruction Fuzzy Hash: FA0248752006159FCB14EF28C981E6AB7E5FF88714F04C95DF99A9B2A2CB34EC41CB91
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00A5F756
                                                                • _wcscmp.LIBCMT ref: 00A5F76B
                                                                • _wcscmp.LIBCMT ref: 00A5F782
                                                                  • Part of subcall function 00A54875: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00A54890
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00A5F7B1
                                                                • FindClose.KERNEL32(00000000), ref: 00A5F7BC
                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00A5F7D8
                                                                • _wcscmp.LIBCMT ref: 00A5F7FF
                                                                • _wcscmp.LIBCMT ref: 00A5F816
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A5F828
                                                                • SetCurrentDirectoryW.KERNEL32(00AAB578), ref: 00A5F846
                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A5F850
                                                                • FindClose.KERNEL32(00000000), ref: 00A5F85D
                                                                • FindClose.KERNEL32(00000000), ref: 00A5F86F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                • String ID: *.*
                                                                • API String ID: 1824444939-438819550
                                                                • Opcode ID: 12fdc695168e67c781c00b345e6f18879436bb377c5d66141098cc8f0ece589a
                                                                • Instruction ID: 1d644364ab12fadd42bb380e5a1cb0af393fe022181a2e03771741f4127f97be
                                                                • Opcode Fuzzy Hash: 12fdc695168e67c781c00b345e6f18879436bb377c5d66141098cc8f0ece589a
                                                                • Instruction Fuzzy Hash: 0A31847294121ABEDF10DFB49C48ADE77ACAF19322F100565ED54A21E1E770DA8D8B60
                                                                APIs
                                                                  • Part of subcall function 00A48E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A48E3C
                                                                  • Part of subcall function 00A48E20: GetLastError.KERNEL32(?,00A48900,?,?,?), ref: 00A48E46
                                                                  • Part of subcall function 00A48E20: GetProcessHeap.KERNEL32(00000008,?,?,00A48900,?,?,?), ref: 00A48E55
                                                                  • Part of subcall function 00A48E20: HeapAlloc.KERNEL32(00000000,?,00A48900,?,?,?), ref: 00A48E5C
                                                                  • Part of subcall function 00A48E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A48E73
                                                                  • Part of subcall function 00A48EBD: GetProcessHeap.KERNEL32(00000008,00A48916,00000000,00000000,?,00A48916,?), ref: 00A48EC9
                                                                  • Part of subcall function 00A48EBD: HeapAlloc.KERNEL32(00000000,?,00A48916,?), ref: 00A48ED0
                                                                  • Part of subcall function 00A48EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00A48916,?), ref: 00A48EE1
                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A48931
                                                                • _memset.LIBCMT ref: 00A48946
                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A48965
                                                                • GetLengthSid.ADVAPI32(?), ref: 00A48976
                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00A489B3
                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A489CF
                                                                • GetLengthSid.ADVAPI32(?), ref: 00A489EC
                                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00A489FB
                                                                • HeapAlloc.KERNEL32(00000000), ref: 00A48A02
                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A48A23
                                                                • CopySid.ADVAPI32(00000000), ref: 00A48A2A
                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A48A5B
                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A48A81
                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A48A95
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                • String ID:
                                                                • API String ID: 3996160137-0
                                                                • Opcode ID: d89ba3eaa6c2c2de10fad463ecc8ed37e8b8e6643f07fc88cb6c9e94375a83a2
                                                                • Instruction ID: 845e8974a3f3b9d3b9a9e1ca549e8b1f349a03aa3b4a96e5ce9c034db6c65f16
                                                                • Opcode Fuzzy Hash: d89ba3eaa6c2c2de10fad463ecc8ed37e8b8e6643f07fc88cb6c9e94375a83a2
                                                                • Instruction Fuzzy Hash: E9613979900209BFDF01DFA5EC49EAEBB79FF44304F14812AE915A7290DB799A05CB60
                                                                APIs
                                                                  • Part of subcall function 00A7147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A7040D,?,?), ref: 00A71491
                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A70B0C
                                                                  • Part of subcall function 009F4D37: __itow.LIBCMT ref: 009F4D62
                                                                  • Part of subcall function 009F4D37: __swprintf.LIBCMT ref: 009F4DAC
                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00A70BAB
                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00A70C43
                                                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00A70E82
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00A70E8F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                • String ID:
                                                                • API String ID: 1240663315-0
                                                                • Opcode ID: d056509ee40526ba0d22f28c4450b0909d1e3b04973fa6881a669f1c4ead4b71
                                                                • Instruction ID: bc32a4c50b330536289755b414f324a711e276985bab44a10fe2c73d1adce276
                                                                • Opcode Fuzzy Hash: d056509ee40526ba0d22f28c4450b0909d1e3b04973fa6881a669f1c4ead4b71
                                                                • Instruction Fuzzy Hash: B2E13931204214AFCB14DF29C995E6ABBF9EF89714F04C96DF84ADB2A1DB30E905CB51
                                                                APIs
                                                                • __swprintf.LIBCMT ref: 00A54451
                                                                • __swprintf.LIBCMT ref: 00A5445E
                                                                  • Part of subcall function 00A138C8: __woutput_l.LIBCMT ref: 00A13921
                                                                • FindResourceW.KERNEL32(?,?,0000000E), ref: 00A54488
                                                                • LoadResource.KERNEL32(?,00000000), ref: 00A54494
                                                                • LockResource.KERNEL32(00000000), ref: 00A544A1
                                                                • FindResourceW.KERNEL32(?,?,00000003), ref: 00A544C1
                                                                • LoadResource.KERNEL32(?,00000000), ref: 00A544D3
                                                                • SizeofResource.KERNEL32(?,00000000), ref: 00A544E2
                                                                • LockResource.KERNEL32(?), ref: 00A544EE
                                                                • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00A5454F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                                • String ID:
                                                                • API String ID: 1433390588-0
                                                                • Opcode ID: 757edca25052272db56f23b9693a2e42d982b14219e6732b0d7b47f6fd73fc4f
                                                                • Instruction ID: fc361b7b75b209bb4be3f7ddf9620be1394b858d89ffa033214cbfdbcc83cd16
                                                                • Opcode Fuzzy Hash: 757edca25052272db56f23b9693a2e42d982b14219e6732b0d7b47f6fd73fc4f
                                                                • Instruction Fuzzy Hash: 6B316B7250121AABDB119FA0AD48EBB7BB8FB08346F004525FE1292161E774DA56CB60
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                • String ID:
                                                                • API String ID: 1737998785-0
                                                                • Opcode ID: afe326f165d8f91e10b9eb2d48e70127b9eb4be788778cc89e0e6379d17ce10b
                                                                • Instruction ID: 5ce8e0e15ea797794af021878a98e43941dce30b099e30caf59b715c4c54fcef
                                                                • Opcode Fuzzy Hash: afe326f165d8f91e10b9eb2d48e70127b9eb4be788778cc89e0e6379d17ce10b
                                                                • Instruction Fuzzy Hash: 0F21A9352412109FD711EF64EC49F6E7BB8EF88711F018015FA06972B1DB70AD11CB54
                                                                APIs
                                                                  • Part of subcall function 00A10284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A02A58,?,00008000), ref: 00A102A4
                                                                  • Part of subcall function 00A54FEC: GetFileAttributesW.KERNEL32(?,00A53BFE), ref: 00A54FED
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00A53D96
                                                                • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00A53E3E
                                                                • MoveFileW.KERNEL32(?,?), ref: 00A53E51
                                                                • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00A53E6E
                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A53E90
                                                                • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00A53EAC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                • String ID: \*.*
                                                                • API String ID: 4002782344-1173974218
                                                                • Opcode ID: 158fe32708ba7bebf84d31cd749862f641b8ad3ec203a28a0b9f146692f223fb
                                                                • Instruction ID: bcbe65284e7986534ebee760a6e09d08073635be091f5aed8f3ebab78ede6d7f
                                                                • Opcode Fuzzy Hash: 158fe32708ba7bebf84d31cd749862f641b8ad3ec203a28a0b9f146692f223fb
                                                                • Instruction Fuzzy Hash: 8C51703280114DAACF15EBE0DA92DEDB7B9AF54341F200165E842B7192EF716F0DCB60
                                                                APIs
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00A5FA83
                                                                • FindClose.KERNEL32(00000000), ref: 00A5FB96
                                                                  • Part of subcall function 009F52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 009F52E6
                                                                • Sleep.KERNEL32(0000000A), ref: 00A5FAB3
                                                                • _wcscmp.LIBCMT ref: 00A5FAC7
                                                                • _wcscmp.LIBCMT ref: 00A5FAE2
                                                                • FindNextFileW.KERNEL32(?,?), ref: 00A5FB80
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                                                • String ID: *.*
                                                                • API String ID: 2185952417-438819550
                                                                • Opcode ID: 10f1be6cc76f2f529757842be93c55e4e8a946d2761922060bc18649a36a7e1b
                                                                • Instruction ID: 4296dd3a4b2c87079d0f749a76ea650b4498d5511c1f14ccd1059bdfa300f8ef
                                                                • Opcode Fuzzy Hash: 10f1be6cc76f2f529757842be93c55e4e8a946d2761922060bc18649a36a7e1b
                                                                • Instruction Fuzzy Hash: F6417D7194021EAFDF14DFA4CD59AEEBBB4FF05351F144566F814A3291EB309A88CB90
                                                                APIs
                                                                  • Part of subcall function 00A49399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A493E3
                                                                  • Part of subcall function 00A49399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A49410
                                                                  • Part of subcall function 00A49399: GetLastError.KERNEL32 ref: 00A4941D
                                                                • ExitWindowsEx.USER32(?,00000000), ref: 00A557B4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                • String ID: $@$SeShutdownPrivilege
                                                                • API String ID: 2234035333-194228
                                                                • Opcode ID: 93422a33a42a146acefe705ce4b039233cd0f55aa61822802d71967aab8fda9d
                                                                • Instruction ID: 3ccb17b8bc6fd7e84a3a91d2dcdeeb7b8865d03891e65f799f5bc390b84b893e
                                                                • Opcode Fuzzy Hash: 93422a33a42a146acefe705ce4b039233cd0f55aa61822802d71967aab8fda9d
                                                                • Instruction Fuzzy Hash: 3601F731E51712EAE76863B59CAAFBB7268FB0D752F200829FD13D60D2EA705C0C8160
                                                                APIs
                                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00A669C7
                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A669D6
                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00A669F2
                                                                • listen.WSOCK32(00000000,00000005), ref: 00A66A01
                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A66A1B
                                                                • closesocket.WSOCK32(00000000,00000000), ref: 00A66A2F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$bindclosesocketlistensocket
                                                                • String ID:
                                                                • API String ID: 1279440585-0
                                                                • Opcode ID: 12a1db40e58c0bd1a03ff4420345b0bddbd54cefbb2e55893ea35a50d3dcf453
                                                                • Instruction ID: 96d804ea5f6f0ca75ef9ce2d3183aade9857d244f7a338ea2c81590179f6ba1b
                                                                • Opcode Fuzzy Hash: 12a1db40e58c0bd1a03ff4420345b0bddbd54cefbb2e55893ea35a50d3dcf453
                                                                • Instruction Fuzzy Hash: 9421D0316006049FCB10EFA8C989F3EB7B9EF84720F148258E916A73D1CB30AC05CB90
                                                                APIs
                                                                  • Part of subcall function 009F29E2: GetWindowLongW.USER32(?,000000EB), ref: 009F29F3
                                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 009F1DD6
                                                                • GetSysColor.USER32(0000000F), ref: 009F1E2A
                                                                • SetBkColor.GDI32(?,00000000), ref: 009F1E3D
                                                                  • Part of subcall function 009F166C: DefDlgProcW.USER32(?,00000020,?), ref: 009F16B4
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ColorProc$LongWindow
                                                                • String ID:
                                                                • API String ID: 3744519093-0
                                                                • Opcode ID: 171c03de87d23f6db1e3a9d5fa753385c6e385d313a25af64dea6bcc70b8d259
                                                                • Instruction ID: 4835eaf46f95a9a2cb20f6213f2087c7f4bfbb31982de7af4f2f51ff5ff127f2
                                                                • Opcode Fuzzy Hash: 171c03de87d23f6db1e3a9d5fa753385c6e385d313a25af64dea6bcc70b8d259
                                                                • Instruction Fuzzy Hash: 63A1547011541CFBD628AB6D9C49EBF3ABDDB81315F25862AF602D61D2CB299C02C3F5
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?), ref: 00A5C329
                                                                • _wcscmp.LIBCMT ref: 00A5C359
                                                                • _wcscmp.LIBCMT ref: 00A5C36E
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00A5C37F
                                                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00A5C3AF
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Find$File_wcscmp$CloseFirstNext
                                                                • String ID:
                                                                • API String ID: 2387731787-0
                                                                • Opcode ID: b29d0b1d22fd990435a416d8b90d1399f66b23b3bb2c264f2b2f8efa29ba0710
                                                                • Instruction ID: f351a40cd05d1abad599e89b2a27fa559c3cc40367dbe5921875a2f9023bd3ed
                                                                • Opcode Fuzzy Hash: b29d0b1d22fd990435a416d8b90d1399f66b23b3bb2c264f2b2f8efa29ba0710
                                                                • Instruction Fuzzy Hash: CC5199356047069FC714DF68D494EAAB3E8FF49321F10861DE95A8B3A1DB30AD09CB91
                                                                APIs
                                                                  • Part of subcall function 00A68475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A684A0
                                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00A66E89
                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A66EB2
                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00A66EEB
                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A66EF8
                                                                • closesocket.WSOCK32(00000000,00000000), ref: 00A66F0C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                • String ID:
                                                                • API String ID: 99427753-0
                                                                • Opcode ID: 5646044a81f605517cdf785d163871d9ec9733282161d86bf688c4297950d500
                                                                • Instruction ID: 0ac147e3a2f1d158608ae83c7b0a11cf57bc2fb297fc5c49f47662c1f29896e8
                                                                • Opcode Fuzzy Hash: 5646044a81f605517cdf785d163871d9ec9733282161d86bf688c4297950d500
                                                                • Instruction Fuzzy Hash: B341D375640604AFDB10AF64DC86F7F77A8DB84710F048558FA16AB3D2DB70AD018BA1
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                • String ID:
                                                                • API String ID: 292994002-0
                                                                • Opcode ID: bc9c4d45ea4620834753fc69cd9688a19e5bc72ba6aaa4058640f75e7f7d1eea
                                                                • Instruction ID: 5e8bc096ca60b2a56e5d313f951a8a3915df405fae5123555b9a3e02cf91a014
                                                                • Opcode Fuzzy Hash: bc9c4d45ea4620834753fc69cd9688a19e5bc72ba6aaa4058640f75e7f7d1eea
                                                                • Instruction Fuzzy Hash: CC118672B00A159FE7115F769C84B2E7B99EF84761F05C139E949D7241DBB0A9028BA0
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: LocalTime__swprintf
                                                                • String ID: %.3d$WIN_XPe
                                                                • API String ID: 2070861257-2409531811
                                                                • Opcode ID: dc7312a1b767bcd045201c6e78949871a0420c9448f1746ff9112fa61023c88d
                                                                • Instruction ID: c19bc001caebfa13f5d47480da30a5e8450a6c0e710835df523019b7881eed90
                                                                • Opcode Fuzzy Hash: dc7312a1b767bcd045201c6e78949871a0420c9448f1746ff9112fa61023c88d
                                                                • Instruction Fuzzy Hash: 7FD01272858108EACB4CDB90C954EFA777CBB06300F100452F606E2040E33587889B26
                                                                APIs
                                                                • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00A61ED6,00000000), ref: 00A62AAD
                                                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00A62AE4
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Internet$AvailableDataFileQueryRead
                                                                • String ID:
                                                                • API String ID: 599397726-0
                                                                • Opcode ID: c8de0cec273e9b61a96a18ed36d4f017adad1f2ede203d37d9a4d47be7e34847
                                                                • Instruction ID: e30a0b02874cecb91ecb457cd538a4d32cd54895ac0f0d439c374e0e9d6c1907
                                                                • Opcode Fuzzy Hash: c8de0cec273e9b61a96a18ed36d4f017adad1f2ede203d37d9a4d47be7e34847
                                                                • Instruction Fuzzy Hash: 14419471A04A09BFEB20DF94CD85FBBB7BCEB50794F10406AF605A7181DAB19E819760
                                                                APIs
                                                                  • Part of subcall function 00A10FE6: std::exception::exception.LIBCMT ref: 00A1101C
                                                                  • Part of subcall function 00A10FE6: __CxxThrowException@8.LIBCMT ref: 00A11031
                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A493E3
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A49410
                                                                • GetLastError.KERNEL32 ref: 00A4941D
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                • String ID:
                                                                • API String ID: 1922334811-0
                                                                • Opcode ID: 784e1938275d3277419d4c524568ab69621cdfa7070936eb5f69b0d06942fbf1
                                                                • Instruction ID: 135948d9c1da09736f199b868a9225adefa4f2cc9ad898d560613424891e64a2
                                                                • Opcode Fuzzy Hash: 784e1938275d3277419d4c524568ab69621cdfa7070936eb5f69b0d06942fbf1
                                                                • Instruction Fuzzy Hash: 5D1191B1414205AFD728DF54DD86D6BB7BCEB48710B21852EF45997240EB70BC52CB60
                                                                APIs
                                                                • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A542FF
                                                                • DeviceIoControl.KERNEL32(00000000,002D1400,00000007,0000000C,?,0000000C,?,00000000), ref: 00A5433C
                                                                • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00A54345
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CloseControlCreateDeviceFileHandle
                                                                • String ID:
                                                                • API String ID: 33631002-0
                                                                • Opcode ID: 7dab561500f1b9b298c8f5531d0add299029422ef100779629f4537a6b9cbbdd
                                                                • Instruction ID: ea893b17f0ea37325675ac0c344418d41ac2b76722c40b0b48fdd183b8806827
                                                                • Opcode Fuzzy Hash: 7dab561500f1b9b298c8f5531d0add299029422ef100779629f4537a6b9cbbdd
                                                                • Instruction Fuzzy Hash: 561186B1900225BEE710DBE8DC48FEFB7BCEB08725F000256BD14E71A0D2745D4587A1
                                                                APIs
                                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00A54F45
                                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00A54F5C
                                                                • FreeSid.ADVAPI32(?), ref: 00A54F6C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                • String ID:
                                                                • API String ID: 3429775523-0
                                                                • Opcode ID: a8da333a212b94289cdcfea31ee87a16efcb09227549c58878ac86fa66624cf5
                                                                • Instruction ID: 38f8841cdca3946fdb79915d874c62774274e7bb234c7002faeff4937661e717
                                                                • Opcode Fuzzy Hash: a8da333a212b94289cdcfea31ee87a16efcb09227549c58878ac86fa66624cf5
                                                                • Instruction Fuzzy Hash: 45F04975A1130CBFDF00DFE4DC89EAEBBBCEF08201F0044A9A901E2180E7356A488B50
                                                                APIs
                                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00A51B01
                                                                • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00A51B14
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: InputSendkeybd_event
                                                                • String ID:
                                                                • API String ID: 3536248340-0
                                                                • Opcode ID: b70f79f15e24630534d2ebd9c6a9bddc40232088d3bcf6799b0f4fabd135cbd6
                                                                • Instruction ID: c7cb1d2c2c7d86077b41d7b0ae97101f352fd24417d57aa8b7ed58ecc474f690
                                                                • Opcode Fuzzy Hash: b70f79f15e24630534d2ebd9c6a9bddc40232088d3bcf6799b0f4fabd135cbd6
                                                                • Instruction Fuzzy Hash: E3F0497190020DABDB04DF94C805BFE7BB4FF04316F00804AFD5596292D3799619DFA4
                                                                APIs
                                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,00A69B52,?,00A8098C,?), ref: 00A5A6DA
                                                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,00A69B52,?,00A8098C,?), ref: 00A5A6EC
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ErrorFormatLastMessage
                                                                • String ID:
                                                                • API String ID: 3479602957-0
                                                                • Opcode ID: 8c0478775dbe9d7edfed6a2096ff334616d64a825144007c06d3334700100519
                                                                • Instruction ID: aabc3714ac756399440cca84faada3d30ad5a68351859237c899e47a1a44e3d0
                                                                • Opcode Fuzzy Hash: 8c0478775dbe9d7edfed6a2096ff334616d64a825144007c06d3334700100519
                                                                • Instruction Fuzzy Hash: 4AF0A73550422DBBDB20AFA4DC48FEB77ACFF19361F008255B908D6181D6709945CBE1
                                                                APIs
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A48F27), ref: 00A48DFE
                                                                • CloseHandle.KERNEL32(?,?,00A48F27), ref: 00A48E10
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                                • String ID:
                                                                • API String ID: 81990902-0
                                                                • Opcode ID: 1129716617db685f456461cbfe66c8cddd27c1bd6e0ff72ea8f15124dcb84e49
                                                                • Instruction ID: 03ae285ca37df9e6ea9ba6867268d93b0af23a54eeb43bcc7233ec611cdb1e90
                                                                • Opcode Fuzzy Hash: 1129716617db685f456461cbfe66c8cddd27c1bd6e0ff72ea8f15124dcb84e49
                                                                • Instruction Fuzzy Hash: A8E0E675010610EFE7656B50FD09DB777BDEF04310714891DF55584470DB619CD1DB50
                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00A18F87,?,?,?,00000001), ref: 00A1A38A
                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00A1A393
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: 54d7b35f7349a30415d8ec93347081044a3a92bba6229b55510f389dfde4c992
                                                                • Instruction ID: 6fe3994e5b7365ca2f6b5e96d28b36fcdd9d37c4880adbf32f569de6bb8bd9d4
                                                                • Opcode Fuzzy Hash: 54d7b35f7349a30415d8ec93347081044a3a92bba6229b55510f389dfde4c992
                                                                • Instruction Fuzzy Hash: B2B09231064308ABCA806BD1EC09F883F68EB46A62F004010F60D48060CB6254568B91
                                                                APIs
                                                                • BlockInput.USER32(00000001), ref: 00A645F0
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BlockInput
                                                                • String ID:
                                                                • API String ID: 3456056419-0
                                                                • Opcode ID: 34dd846fe1df842e0322a0e121c83fd32da445dfb03c8bc6e9badb076063e2ae
                                                                • Instruction ID: 774bb41de173d82ea39ade78c2ad8182dab6faf89130dd0dbbabd944c3ce3e75
                                                                • Opcode Fuzzy Hash: 34dd846fe1df842e0322a0e121c83fd32da445dfb03c8bc6e9badb076063e2ae
                                                                • Instruction Fuzzy Hash: A2E01A352102199FD750AF99E804A9ABBE8AF98760F048426FE4AD7351DAB0AD418B91
                                                                APIs
                                                                • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00A55205
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: mouse_event
                                                                • String ID:
                                                                • API String ID: 2434400541-0
                                                                • Opcode ID: 194c5a6ca2052aa85fb96802b666096e31490725b2a1101f26401b52cd903d9d
                                                                • Instruction ID: 397a9180be8470b2be46bf11261bf34e576a155123a915dd7d11daa1a5afbf9c
                                                                • Opcode Fuzzy Hash: 194c5a6ca2052aa85fb96802b666096e31490725b2a1101f26401b52cd903d9d
                                                                • Instruction Fuzzy Hash: 38D017A4960E0928E85823B49A2FF360A08BB007C2F8443497802850C1A8B0584DD431
                                                                APIs
                                                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00A48FA7), ref: 00A49389
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: LogonUser
                                                                • String ID:
                                                                • API String ID: 1244722697-0
                                                                • Opcode ID: 86f1b38cc06ea92da32c7b9a4e8def24432786065a875d913129d08aebe1f9b0
                                                                • Instruction ID: 3702b25576c893ed4640c08675a14a912a2300cda9aad74893a53dbedb578b47
                                                                • Opcode Fuzzy Hash: 86f1b38cc06ea92da32c7b9a4e8def24432786065a875d913129d08aebe1f9b0
                                                                • Instruction Fuzzy Hash: F8D05E3326050EABEF018EA4DC01EAE3B79EB04B01F408111FE15D50A0C775D835AB60
                                                                APIs
                                                                • GetUserNameW.ADVAPI32(?,?), ref: 00A30734
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: NameUser
                                                                • String ID:
                                                                • API String ID: 2645101109-0
                                                                • Opcode ID: dc1f6ae8d0e2391238bdc6e107c26ae16226cb109474176b9ebc2b7d4de812f2
                                                                • Instruction ID: 4d732a3704fb77dbf0c8f9680d846d2bcc5865687c00272a001754a6330bdbd3
                                                                • Opcode Fuzzy Hash: dc1f6ae8d0e2391238bdc6e107c26ae16226cb109474176b9ebc2b7d4de812f2
                                                                • Instruction Fuzzy Hash: E1C04CF1800109DBCB05DBA0D998EEF7BBCAB04305F100055A105B2110D7749B448B71
                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00A1A35A
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: 33f399fce0472e4c3f5e9ece50c5bd961528dc787efd9d22aeba22317890648b
                                                                • Instruction ID: 06a267ae84b7f4ff88dbc63f98ebd026096bf49572f0960eab8c11d4fdebe506
                                                                • Opcode Fuzzy Hash: 33f399fce0472e4c3f5e9ece50c5bd961528dc787efd9d22aeba22317890648b
                                                                • Instruction Fuzzy Hash: 3FA0223002020CFBCF002FC2FC08C88BFACEB022A0B008020F80C08032CB33A8228BC0
                                                                APIs
                                                                • DeleteObject.GDI32(00000000), ref: 00A67F45
                                                                • DeleteObject.GDI32(00000000), ref: 00A67F57
                                                                • DestroyWindow.USER32 ref: 00A67F65
                                                                • GetDesktopWindow.USER32 ref: 00A67F7F
                                                                • GetWindowRect.USER32(00000000), ref: 00A67F86
                                                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00A680C7
                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00A680D7
                                                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A6811F
                                                                • GetClientRect.USER32(00000000,?), ref: 00A6812B
                                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00A68165
                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A68187
                                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A6819A
                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A681A5
                                                                • GlobalLock.KERNEL32(00000000), ref: 00A681AE
                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A681BD
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00A681C6
                                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A681CD
                                                                • GlobalFree.KERNEL32(00000000), ref: 00A681D8
                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A681EA
                                                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00A83C7C,00000000), ref: 00A68200
                                                                • GlobalFree.KERNEL32(00000000), ref: 00A68210
                                                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00A68236
                                                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00A68255
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A68277
                                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00A68464
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                • String ID: $AutoIt v3$DISPLAY$static
                                                                • API String ID: 2211948467-2373415609
                                                                • Opcode ID: aa3ea1780efffa28a3d784cb7a09d42a8cc2d4c236dbf6857ef1b28285bde5a0
                                                                • Instruction ID: 33140dcbfac59a76572519b97b5b4822d6059c9f6cd6b3586edd0a6a13288bc0
                                                                • Opcode Fuzzy Hash: aa3ea1780efffa28a3d784cb7a09d42a8cc2d4c236dbf6857ef1b28285bde5a0
                                                                • Instruction Fuzzy Hash: 9A027171900119EFDB14DFA4CC89EAE7BB9FF48310F048658F915AB2A1DB749D46CB60
                                                                APIs
                                                                • CharUpperBuffW.USER32(?,?,00A80980), ref: 00A73C65
                                                                • IsWindowVisible.USER32(?), ref: 00A73C89
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharUpperVisibleWindow
                                                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                • API String ID: 4105515805-45149045
                                                                • Opcode ID: 4ed4d5bdb3607a196228e8fb9ff0d9f1c3d9914d724c6ceec0ce069b4cc5db0a
                                                                • Instruction ID: 7016c4149c0ab9f23700ac12d10942431d5f818b056be0f5d23fe0c7d5a77341
                                                                • Opcode Fuzzy Hash: 4ed4d5bdb3607a196228e8fb9ff0d9f1c3d9914d724c6ceec0ce069b4cc5db0a
                                                                • Instruction Fuzzy Hash: B9D18031204205CFCB14EF10C951EAEB7B5AF99354F11C868F94A5B2E2CB75EE4ADB42
                                                                APIs
                                                                • SetTextColor.GDI32(?,00000000), ref: 00A7AC55
                                                                • GetSysColorBrush.USER32(0000000F), ref: 00A7AC86
                                                                • GetSysColor.USER32(0000000F), ref: 00A7AC92
                                                                • SetBkColor.GDI32(?,000000FF), ref: 00A7ACAC
                                                                • SelectObject.GDI32(?,?), ref: 00A7ACBB
                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00A7ACE6
                                                                • GetSysColor.USER32(00000010), ref: 00A7ACEE
                                                                • CreateSolidBrush.GDI32(00000000), ref: 00A7ACF5
                                                                • FrameRect.USER32(?,?,00000000), ref: 00A7AD04
                                                                • DeleteObject.GDI32(00000000), ref: 00A7AD0B
                                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 00A7AD56
                                                                • FillRect.USER32(?,?,?), ref: 00A7AD88
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A7ADB3
                                                                  • Part of subcall function 00A7AF18: GetSysColor.USER32(00000012), ref: 00A7AF51
                                                                  • Part of subcall function 00A7AF18: SetTextColor.GDI32(?,?), ref: 00A7AF55
                                                                  • Part of subcall function 00A7AF18: GetSysColorBrush.USER32(0000000F), ref: 00A7AF6B
                                                                  • Part of subcall function 00A7AF18: GetSysColor.USER32(0000000F), ref: 00A7AF76
                                                                  • Part of subcall function 00A7AF18: GetSysColor.USER32(00000011), ref: 00A7AF93
                                                                  • Part of subcall function 00A7AF18: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A7AFA1
                                                                  • Part of subcall function 00A7AF18: SelectObject.GDI32(?,00000000), ref: 00A7AFB2
                                                                  • Part of subcall function 00A7AF18: SetBkColor.GDI32(?,00000000), ref: 00A7AFBB
                                                                  • Part of subcall function 00A7AF18: SelectObject.GDI32(?,?), ref: 00A7AFC8
                                                                  • Part of subcall function 00A7AF18: InflateRect.USER32(?,000000FF,000000FF), ref: 00A7AFE7
                                                                  • Part of subcall function 00A7AF18: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A7AFFE
                                                                  • Part of subcall function 00A7AF18: GetWindowLongW.USER32(00000000,000000F0), ref: 00A7B013
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                • String ID:
                                                                • API String ID: 4124339563-0
                                                                • Opcode ID: 396efe77f6be27c10c7553e7f59b00668ec7f339fe0416d471fc21f33655b67a
                                                                • Instruction ID: 5cc7367a318efa5a3deeea1fde0250ecc1ab6c2a7ada9e482169418e2660b635
                                                                • Opcode Fuzzy Hash: 396efe77f6be27c10c7553e7f59b00668ec7f339fe0416d471fc21f33655b67a
                                                                • Instruction Fuzzy Hash: 35A17972008301BFD795DFA4DC08E6F7BA9FF88321F108A19F966961A1D770D849CB52
                                                                APIs
                                                                • DestroyWindow.USER32(?,?,?), ref: 009F3072
                                                                • DeleteObject.GDI32(00000000), ref: 009F30B8
                                                                • DeleteObject.GDI32(00000000), ref: 009F30C3
                                                                • DestroyIcon.USER32(00000000,?,?,?), ref: 009F30CE
                                                                • DestroyWindow.USER32(00000000,?,?,?), ref: 009F30D9
                                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 00A2C77C
                                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00A2C7B5
                                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00A2CBDE
                                                                  • Part of subcall function 009F1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009F2412,?,00000000,?,?,?,?,009F1AA7,00000000,?), ref: 009F1F76
                                                                • SendMessageW.USER32(?,00001053), ref: 00A2CC1B
                                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00A2CC32
                                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A2CC48
                                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A2CC53
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                • String ID: 0
                                                                • API String ID: 464785882-4108050209
                                                                • Opcode ID: b138c9e5e0e7eab32a9271dd1569f36028b1b37599f2941dd317905b3130d76c
                                                                • Instruction ID: 72c836dacbd18f5949b59b5f78c4f49a686b60dd9abc4cc8b6e6a817cee44b94
                                                                • Opcode Fuzzy Hash: b138c9e5e0e7eab32a9271dd1569f36028b1b37599f2941dd317905b3130d76c
                                                                • Instruction Fuzzy Hash: 34129F30600215EFCB24CF28D884BA9BBE5BF48320F18857AF555CB262CB35ED56CB91
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                                                • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                • API String ID: 2660009612-1645009161
                                                                • Opcode ID: bac9f3b68febcfc9b1f1a091e8541d40cf656feaf832051ba7e73c6aaa332856
                                                                • Instruction ID: b8eed5644c872996d596b5277f872458017563d0ae81153d40271ee4f82ebce2
                                                                • Opcode Fuzzy Hash: bac9f3b68febcfc9b1f1a091e8541d40cf656feaf832051ba7e73c6aaa332856
                                                                • Instruction Fuzzy Hash: 35A18971A40309BBCB24AF60EE56FBE7BB8BF45740F104029F805AA2D2EB719E55D750
                                                                APIs
                                                                • DestroyWindow.USER32(00000000), ref: 00A67BC8
                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00A67C87
                                                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00A67CC5
                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00A67CD7
                                                                • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00A67D1D
                                                                • GetClientRect.USER32(00000000,?), ref: 00A67D29
                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00A67D6D
                                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00A67D7C
                                                                • GetStockObject.GDI32(00000011), ref: 00A67D8C
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00A67D90
                                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00A67DA0
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A67DA9
                                                                • DeleteDC.GDI32(00000000), ref: 00A67DB2
                                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00A67DDE
                                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 00A67DF5
                                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00A67E30
                                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00A67E44
                                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 00A67E55
                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00A67E85
                                                                • GetStockObject.GDI32(00000011), ref: 00A67E90
                                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00A67E9B
                                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00A67EA5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                • API String ID: 2910397461-517079104
                                                                • Opcode ID: 819ea243fd540a65cad9bbbf86ec009a3d8282b4e6797c4b1c3d46e3ffbd967c
                                                                • Instruction ID: bccd766d08e87426d0baa2c5c502c95bc31b148874430ed286494df8e0e881e7
                                                                • Opcode Fuzzy Hash: 819ea243fd540a65cad9bbbf86ec009a3d8282b4e6797c4b1c3d46e3ffbd967c
                                                                • Instruction Fuzzy Hash: 5FA16DB1A40619BFEB14DBA4DC4AFAE7BB9EF44710F044214FA15A72E1D7B0AD05CB60
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00000001), ref: 00A5B361
                                                                • GetDriveTypeW.KERNEL32(?,00A82C4C,?,\\.\,00A80980), ref: 00A5B43E
                                                                • SetErrorMode.KERNEL32(00000000,00A82C4C,?,\\.\,00A80980), ref: 00A5B59C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode$DriveType
                                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                • API String ID: 2907320926-4222207086
                                                                • Opcode ID: fe5ad5ee903b856ddf3897e7dd16b787c735daa93b563cb0ea475f75a71e034b
                                                                • Instruction ID: 9f6ebf3c37175b68a44d5a6b7f8d7edddbcc1a9e69edb3252ddf0553f2cb5e35
                                                                • Opcode Fuzzy Hash: fe5ad5ee903b856ddf3897e7dd16b787c735daa93b563cb0ea475f75a71e034b
                                                                • Instruction Fuzzy Hash: 38516330B60209FBC714DB60CA42ABD77B1BB85783B244415F807A72D2E771AE89DB71
                                                                APIs
                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00A7A0F7
                                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00A7A1B0
                                                                • SendMessageW.USER32(?,00001102,00000002,?), ref: 00A7A1CC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window
                                                                • String ID: 0
                                                                • API String ID: 2326795674-4108050209
                                                                • Opcode ID: 15e62cea427b32420a199c625518965404aa93bb936dae6808a3c8c2224a6797
                                                                • Instruction ID: a81dd36d5b1b40ae85351ba23338a7589c1c75e12c72c4b0c7df84b96534aef3
                                                                • Opcode Fuzzy Hash: 15e62cea427b32420a199c625518965404aa93bb936dae6808a3c8c2224a6797
                                                                • Instruction Fuzzy Hash: 0102CA30208201BFEB25CF14CC58BAEBBE4FFA5314F04C629F99D962A1D7759855CB92
                                                                APIs
                                                                • GetSysColor.USER32(00000012), ref: 00A7AF51
                                                                • SetTextColor.GDI32(?,?), ref: 00A7AF55
                                                                • GetSysColorBrush.USER32(0000000F), ref: 00A7AF6B
                                                                • GetSysColor.USER32(0000000F), ref: 00A7AF76
                                                                • CreateSolidBrush.GDI32(?), ref: 00A7AF7B
                                                                • GetSysColor.USER32(00000011), ref: 00A7AF93
                                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A7AFA1
                                                                • SelectObject.GDI32(?,00000000), ref: 00A7AFB2
                                                                • SetBkColor.GDI32(?,00000000), ref: 00A7AFBB
                                                                • SelectObject.GDI32(?,?), ref: 00A7AFC8
                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00A7AFE7
                                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A7AFFE
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00A7B013
                                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A7B05F
                                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00A7B086
                                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00A7B0A4
                                                                • DrawFocusRect.USER32(?,?), ref: 00A7B0AF
                                                                • GetSysColor.USER32(00000011), ref: 00A7B0BD
                                                                • SetTextColor.GDI32(?,00000000), ref: 00A7B0C5
                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00A7B0D9
                                                                • SelectObject.GDI32(?,00A7AC1F), ref: 00A7B0F0
                                                                • DeleteObject.GDI32(?), ref: 00A7B0FB
                                                                • SelectObject.GDI32(?,?), ref: 00A7B101
                                                                • DeleteObject.GDI32(?), ref: 00A7B106
                                                                • SetTextColor.GDI32(?,?), ref: 00A7B10C
                                                                • SetBkColor.GDI32(?,?), ref: 00A7B116
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                • String ID:
                                                                • API String ID: 1996641542-0
                                                                • Opcode ID: 05b7e85067b252e059c0113758877b115a2b17dbfee609d10aeb2fff86ce62a7
                                                                • Instruction ID: a2dbd28e20960890d29170c834ef1f6df479ce46eda7dcb4bdef6eb95d6d9e24
                                                                • Opcode Fuzzy Hash: 05b7e85067b252e059c0113758877b115a2b17dbfee609d10aeb2fff86ce62a7
                                                                • Instruction Fuzzy Hash: BD615BB2900218BFDB51DFA4DC48EAE7B79FF08320F118215F919AB2A1D7759945CFA0
                                                                APIs
                                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00A790EA
                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A790FB
                                                                • CharNextW.USER32(0000014E), ref: 00A7912A
                                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00A7916B
                                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00A79181
                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A79192
                                                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00A791AF
                                                                • SetWindowTextW.USER32(?,0000014E), ref: 00A791FB
                                                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00A79211
                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A79242
                                                                • _memset.LIBCMT ref: 00A79267
                                                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00A792B0
                                                                • _memset.LIBCMT ref: 00A7930F
                                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00A79339
                                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 00A79391
                                                                • SendMessageW.USER32(?,0000133D,?,?), ref: 00A7943E
                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00A79460
                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A794AA
                                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A794D7
                                                                • DrawMenuBar.USER32(?), ref: 00A794E6
                                                                • SetWindowTextW.USER32(?,0000014E), ref: 00A7950E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                • String ID: 0
                                                                • API String ID: 1073566785-4108050209
                                                                • Opcode ID: 7191d6135dce791f789d48987361e8b4a50ef2537b8f63ca51d3a3d122a7ef98
                                                                • Instruction ID: 1912b6e61d17dcd33a27c6738e2b6c2bdd29f18f74a71a07d777dbccbc6b87a5
                                                                • Opcode Fuzzy Hash: 7191d6135dce791f789d48987361e8b4a50ef2537b8f63ca51d3a3d122a7ef98
                                                                • Instruction Fuzzy Hash: 5CE16D71900219ABDF21DF94CC84EEF7BB8EF09710F10C156FA19AA291D7708A96DF61
                                                                APIs
                                                                • GetCursorPos.USER32(?), ref: 00A75007
                                                                • GetDesktopWindow.USER32 ref: 00A7501C
                                                                • GetWindowRect.USER32(00000000), ref: 00A75023
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A75085
                                                                • DestroyWindow.USER32(?), ref: 00A750B1
                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00A750DA
                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A750F8
                                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00A7511E
                                                                • SendMessageW.USER32(?,00000421,?,?), ref: 00A75133
                                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00A75146
                                                                • IsWindowVisible.USER32(?), ref: 00A75166
                                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00A75181
                                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00A75195
                                                                • GetWindowRect.USER32(?,?), ref: 00A751AD
                                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00A751D3
                                                                • GetMonitorInfoW.USER32(00000000,?), ref: 00A751ED
                                                                • CopyRect.USER32(?,?), ref: 00A75204
                                                                • SendMessageW.USER32(?,00000412,00000000), ref: 00A7526F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                • String ID: ($0$tooltips_class32
                                                                • API String ID: 698492251-4156429822
                                                                • Opcode ID: fc659eba8ff36f8a2f3cba359ada0aaf38012f4350a2e1983a95964e685cfdeb
                                                                • Instruction ID: f7126811d2eaef74d8d0b0bd5a451c73dd39978878b9836d93ccee05d4d82435
                                                                • Opcode Fuzzy Hash: fc659eba8ff36f8a2f3cba359ada0aaf38012f4350a2e1983a95964e685cfdeb
                                                                • Instruction Fuzzy Hash: 6DB15871A04740AFDB44DF64C844B6BBBE4BF89710F00CA1CF5999B292DBB1E805CB92
                                                                APIs
                                                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00A5499C
                                                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00A549C2
                                                                • _wcscpy.LIBCMT ref: 00A549F0
                                                                • _wcscmp.LIBCMT ref: 00A549FB
                                                                • _wcscat.LIBCMT ref: 00A54A11
                                                                • _wcsstr.LIBCMT ref: 00A54A1C
                                                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00A54A38
                                                                • _wcscat.LIBCMT ref: 00A54A81
                                                                • _wcscat.LIBCMT ref: 00A54A88
                                                                • _wcsncpy.LIBCMT ref: 00A54AB3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                • API String ID: 699586101-1459072770
                                                                • Opcode ID: 0e5ec1706b177a80c6751c49faef4e47a295857ea12eaa6421404cf225f874b4
                                                                • Instruction ID: 4c2ea7842ed340f520a70a975134412bb6c56a360cb19b180733953335358fa6
                                                                • Opcode Fuzzy Hash: 0e5ec1706b177a80c6751c49faef4e47a295857ea12eaa6421404cf225f874b4
                                                                • Instruction Fuzzy Hash: DF41E172A042047AEB10AB648E47FFF7B7CEF49350F00045AFD04A6192EB30DA9697A5
                                                                APIs
                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009F2C8C
                                                                • GetSystemMetrics.USER32(00000007), ref: 009F2C94
                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009F2CBF
                                                                • GetSystemMetrics.USER32(00000008), ref: 009F2CC7
                                                                • GetSystemMetrics.USER32(00000004), ref: 009F2CEC
                                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 009F2D09
                                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 009F2D19
                                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 009F2D4C
                                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 009F2D60
                                                                • GetClientRect.USER32(00000000,000000FF), ref: 009F2D7E
                                                                • GetStockObject.GDI32(00000011), ref: 009F2D9A
                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 009F2DA5
                                                                  • Part of subcall function 009F2714: GetCursorPos.USER32(?), ref: 009F2727
                                                                  • Part of subcall function 009F2714: ScreenToClient.USER32(00AB77B0,?), ref: 009F2744
                                                                  • Part of subcall function 009F2714: GetAsyncKeyState.USER32(00000001), ref: 009F2769
                                                                  • Part of subcall function 009F2714: GetAsyncKeyState.USER32(00000002), ref: 009F2777
                                                                • SetTimer.USER32(00000000,00000000,00000028,009F13C7), ref: 009F2DCC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                • String ID: AutoIt v3 GUI
                                                                • API String ID: 1458621304-248962490
                                                                • Opcode ID: 900e00886e1935bf866c8716571e0d0870ed28090d805495a5450e80b7c9abdd
                                                                • Instruction ID: 2cc2461d5644a81b3d043b5b97f9512925adfbcb85df34507bc1c0ba335a2263
                                                                • Opcode Fuzzy Hash: 900e00886e1935bf866c8716571e0d0870ed28090d805495a5450e80b7c9abdd
                                                                • Instruction Fuzzy Hash: FEB13D71A0020A9FDB14DFA8DD59BBE7BB4FB48314F104229FA55E72A0DB74A851CF60
                                                                APIs
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                • GetForegroundWindow.USER32(00A80980,?,?,?,?,?), ref: 00A104E3
                                                                • IsWindow.USER32(?), ref: 00A466BB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$Foreground_memmove
                                                                • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                                • API String ID: 3828923867-1919597938
                                                                • Opcode ID: ee956ca13c842e19c5838bc70670b0f3be9c091f20682edb54307ca51f4e37d7
                                                                • Instruction ID: 707e6f9afe3cf39b5d2e23c189fdc86e5f50a79d62019cc91368b6a0b3ade5ff
                                                                • Opcode Fuzzy Hash: ee956ca13c842e19c5838bc70670b0f3be9c091f20682edb54307ca51f4e37d7
                                                                • Instruction Fuzzy Hash: BED1E334104602DFCB08EF20D6819EAFBB5BF96344F104A29F495875A2DB70F999CB93
                                                                APIs
                                                                • CharUpperBuffW.USER32(?,?), ref: 00A744AC
                                                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00A7456C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharMessageSendUpper
                                                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                • API String ID: 3974292440-719923060
                                                                • Opcode ID: fed1bdac35130afc52c5706cd1a4ed76ae23f1d7508986417b33f3833e81b52e
                                                                • Instruction ID: 792e97aadf838fa54dabecde34737e78d03a76265e78de3763040a88d2c907ef
                                                                • Opcode Fuzzy Hash: fed1bdac35130afc52c5706cd1a4ed76ae23f1d7508986417b33f3833e81b52e
                                                                • Instruction Fuzzy Hash: 25A17B302142059FCB14EF24CD51A7AB3A5BF89314F15C968F99A9B3E2DB70EC05CB51
                                                                APIs
                                                                • LoadCursorW.USER32(00000000,00007F89), ref: 00A656E1
                                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 00A656EC
                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00A656F7
                                                                • LoadCursorW.USER32(00000000,00007F03), ref: 00A65702
                                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 00A6570D
                                                                • LoadCursorW.USER32(00000000,00007F01), ref: 00A65718
                                                                • LoadCursorW.USER32(00000000,00007F81), ref: 00A65723
                                                                • LoadCursorW.USER32(00000000,00007F88), ref: 00A6572E
                                                                • LoadCursorW.USER32(00000000,00007F80), ref: 00A65739
                                                                • LoadCursorW.USER32(00000000,00007F86), ref: 00A65744
                                                                • LoadCursorW.USER32(00000000,00007F83), ref: 00A6574F
                                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00A6575A
                                                                • LoadCursorW.USER32(00000000,00007F82), ref: 00A65765
                                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00A65770
                                                                • LoadCursorW.USER32(00000000,00007F04), ref: 00A6577B
                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00A65786
                                                                • GetCursorInfo.USER32(?), ref: 00A65796
                                                                • GetLastError.KERNEL32(00000001,00000000), ref: 00A657C1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Cursor$Load$ErrorInfoLast
                                                                • String ID:
                                                                • API String ID: 3215588206-0
                                                                • Opcode ID: 2e4f636d42b7ca5017d5429fed756bf894d7105053122699e7794e31ecf664b7
                                                                • Instruction ID: e039e1fee453205c6d78f0fb3ed3856906bc905d003eec13d4cc45d1995927fc
                                                                • Opcode Fuzzy Hash: 2e4f636d42b7ca5017d5429fed756bf894d7105053122699e7794e31ecf664b7
                                                                • Instruction Fuzzy Hash: 21415270E44319AADB109FBA8C49D6EFEF8EF51B10F10452FE519E7290DAB8A401CF51
                                                                APIs
                                                                • GetClassNameW.USER32(?,?,00000100), ref: 00A4B17B
                                                                • __swprintf.LIBCMT ref: 00A4B21C
                                                                • _wcscmp.LIBCMT ref: 00A4B22F
                                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A4B284
                                                                • _wcscmp.LIBCMT ref: 00A4B2C0
                                                                • GetClassNameW.USER32(?,?,00000400), ref: 00A4B2F7
                                                                • GetDlgCtrlID.USER32(?), ref: 00A4B349
                                                                • GetWindowRect.USER32(?,?), ref: 00A4B37F
                                                                • GetParent.USER32(?), ref: 00A4B39D
                                                                • ScreenToClient.USER32(00000000), ref: 00A4B3A4
                                                                • GetClassNameW.USER32(?,?,00000100), ref: 00A4B41E
                                                                • _wcscmp.LIBCMT ref: 00A4B432
                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00A4B458
                                                                • _wcscmp.LIBCMT ref: 00A4B46C
                                                                  • Part of subcall function 00A1385C: _iswctype.LIBCMT ref: 00A13864
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                • String ID: %s%u
                                                                • API String ID: 3744389584-679674701
                                                                • Opcode ID: db5639ade9a7882d4beb2adfe9ebb35ee4bd3c07e973502eaf001ded82fdc894
                                                                • Instruction ID: 401bed6d481930932b98c3c8a0e26d9cc09ecb53240bda1f4bff9be4e789cd72
                                                                • Opcode Fuzzy Hash: db5639ade9a7882d4beb2adfe9ebb35ee4bd3c07e973502eaf001ded82fdc894
                                                                • Instruction Fuzzy Hash: 84A1E175214306AFDB14DF64C884FEAB7E8FF88354F108629F999C2191D770E956CBA0
                                                                APIs
                                                                • GetClassNameW.USER32(00000008,?,00000400), ref: 00A4BAB1
                                                                • _wcscmp.LIBCMT ref: 00A4BAC2
                                                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 00A4BAEA
                                                                • CharUpperBuffW.USER32(?,00000000), ref: 00A4BB07
                                                                • _wcscmp.LIBCMT ref: 00A4BB25
                                                                • _wcsstr.LIBCMT ref: 00A4BB36
                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00A4BB6E
                                                                • _wcscmp.LIBCMT ref: 00A4BB7E
                                                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 00A4BBA5
                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00A4BBEE
                                                                • _wcscmp.LIBCMT ref: 00A4BBFE
                                                                • GetClassNameW.USER32(00000010,?,00000400), ref: 00A4BC26
                                                                • GetWindowRect.USER32(00000004,?), ref: 00A4BC8F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                • String ID: @$ThumbnailClass
                                                                • API String ID: 1788623398-1539354611
                                                                • Opcode ID: 864db590cb56ac4d6c2023093e47d3bf5d9f972c4e10c70385d8487e8e58791c
                                                                • Instruction ID: 7c0023bfb5d8ccf5d9d66c4c40db0e22910acd966da95db64268bb4330553626
                                                                • Opcode Fuzzy Hash: 864db590cb56ac4d6c2023093e47d3bf5d9f972c4e10c70385d8487e8e58791c
                                                                • Instruction Fuzzy Hash: A8819D750182099FDB04DF54C9C5FAA7BE8FF88314F048569FD898A096EB34DD4ACB61
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __wcsnicmp
                                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                • API String ID: 1038674560-1810252412
                                                                • Opcode ID: b7efdf3b61159e00b069b75407db942200168aa96971d406137fadcdba245988
                                                                • Instruction ID: a73f853a355b6c76bcfdbd13d6b83489bb62724f1d7eeaaaf130e7c5fbc5a497
                                                                • Opcode Fuzzy Hash: b7efdf3b61159e00b069b75407db942200168aa96971d406137fadcdba245988
                                                                • Instruction Fuzzy Hash: 8C31A035A44209B6DF14EFA0DE43EEE73B8AF21750F600525F541B20D2EF65AE04CA62
                                                                APIs
                                                                • LoadIconW.USER32(00000063), ref: 00A4CBAA
                                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00A4CBBC
                                                                • SetWindowTextW.USER32(?,?), ref: 00A4CBD3
                                                                • GetDlgItem.USER32(?,000003EA), ref: 00A4CBE8
                                                                • SetWindowTextW.USER32(00000000,?), ref: 00A4CBEE
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00A4CBFE
                                                                • SetWindowTextW.USER32(00000000,?), ref: 00A4CC04
                                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00A4CC25
                                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00A4CC3F
                                                                • GetWindowRect.USER32(?,?), ref: 00A4CC48
                                                                • SetWindowTextW.USER32(?,?), ref: 00A4CCB3
                                                                • GetDesktopWindow.USER32 ref: 00A4CCB9
                                                                • GetWindowRect.USER32(00000000), ref: 00A4CCC0
                                                                • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00A4CD0C
                                                                • GetClientRect.USER32(?,?), ref: 00A4CD19
                                                                • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00A4CD3E
                                                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00A4CD69
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                • String ID:
                                                                • API String ID: 3869813825-0
                                                                • Opcode ID: 4e33676686c32c5f0ac28617326bd73c98db42290cdd9d23ba6b4aa3fc4b326f
                                                                • Instruction ID: 79e0c43a57efeb64f2833c5224c9dd571db19b29ba929ae83ad620715ae0a3b4
                                                                • Opcode Fuzzy Hash: 4e33676686c32c5f0ac28617326bd73c98db42290cdd9d23ba6b4aa3fc4b326f
                                                                • Instruction Fuzzy Hash: C251BF34900709EFDB60DFA8CE89F6EBBF5FF44714F000928E18AA25A0D774A815CB10
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A7A87E
                                                                • DestroyWindow.USER32(00000000,?), ref: 00A7A8F8
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00A7A972
                                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00A7A994
                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A7A9A7
                                                                • DestroyWindow.USER32(00000000), ref: 00A7A9C9
                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,009F0000,00000000), ref: 00A7AA00
                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A7AA19
                                                                • GetDesktopWindow.USER32 ref: 00A7AA32
                                                                • GetWindowRect.USER32(00000000), ref: 00A7AA39
                                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A7AA51
                                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00A7AA69
                                                                  • Part of subcall function 009F29AB: GetWindowLongW.USER32(?,000000EB), ref: 009F29BC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                • String ID: 0$tooltips_class32
                                                                • API String ID: 1297703922-3619404913
                                                                • Opcode ID: 0ac9c6688cfb5447927213b1d50ecbb3e38afae5e94c065d89a32c4ded5f9331
                                                                • Instruction ID: f66183586dc8f7203eff9ecc9ff41d41683893089545d3a5204aea0674def26f
                                                                • Opcode Fuzzy Hash: 0ac9c6688cfb5447927213b1d50ecbb3e38afae5e94c065d89a32c4ded5f9331
                                                                • Instruction Fuzzy Hash: DB717771140204AFD721CF68CC49FAB77E5FBD8300F04862DF98A872A1D7B1A956CB52
                                                                APIs
                                                                  • Part of subcall function 009F29E2: GetWindowLongW.USER32(?,000000EB), ref: 009F29F3
                                                                • DragQueryPoint.SHELL32(?,?), ref: 00A7CCCF
                                                                  • Part of subcall function 00A7B1A9: ClientToScreen.USER32(?,?), ref: 00A7B1D2
                                                                  • Part of subcall function 00A7B1A9: GetWindowRect.USER32(?,?), ref: 00A7B248
                                                                  • Part of subcall function 00A7B1A9: PtInRect.USER32(?,?,00A7C6BC), ref: 00A7B258
                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00A7CD38
                                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00A7CD43
                                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00A7CD66
                                                                • _wcscat.LIBCMT ref: 00A7CD96
                                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00A7CDAD
                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00A7CDC6
                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00A7CDDD
                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00A7CDFF
                                                                • DragFinish.SHELL32(?), ref: 00A7CE06
                                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00A7CEF9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                • API String ID: 169749273-3440237614
                                                                • Opcode ID: eef5026cdf240741ea34fcf066ffc33d388e92acd8e9a2420791ccd4eafb96c3
                                                                • Instruction ID: 8a279704281d78aa94f603618fe8df9f0370862ef7d1fd24d3120dc440a10d7c
                                                                • Opcode Fuzzy Hash: eef5026cdf240741ea34fcf066ffc33d388e92acd8e9a2420791ccd4eafb96c3
                                                                • Instruction Fuzzy Hash: 06615971108305AFD711DF90DC85EAFBBE8EFC9750F004A2DF695921A1DB709A49CB62
                                                                APIs
                                                                • VariantInit.OLEAUT32(00000000), ref: 00A5831A
                                                                • VariantCopy.OLEAUT32(00000000,?), ref: 00A58323
                                                                • VariantClear.OLEAUT32(00000000), ref: 00A5832F
                                                                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00A5841D
                                                                • __swprintf.LIBCMT ref: 00A5844D
                                                                • VarR8FromDec.OLEAUT32(?,?), ref: 00A58479
                                                                • VariantInit.OLEAUT32(?), ref: 00A5852A
                                                                • SysFreeString.OLEAUT32(?), ref: 00A585BE
                                                                • VariantClear.OLEAUT32(?), ref: 00A58618
                                                                • VariantClear.OLEAUT32(?), ref: 00A58627
                                                                • VariantInit.OLEAUT32(00000000), ref: 00A58665
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                                • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                • API String ID: 3730832054-3931177956
                                                                • Opcode ID: 9a7fc4938ff88e4d2c9877fc1361c2a2e4556ba9d59895ab9d57c7da59e61f1c
                                                                • Instruction ID: b3b61b6607e26fa1893036dbdc9dd547478eb7cca1c7e6ecf0133d83beedb809
                                                                • Opcode Fuzzy Hash: 9a7fc4938ff88e4d2c9877fc1361c2a2e4556ba9d59895ab9d57c7da59e61f1c
                                                                • Instruction Fuzzy Hash: 61D1E131604119EBDB209FA5C885BAEB7B4BF04B12F148595EC05BF191DF38EC48DBA0
                                                                APIs
                                                                • CharUpperBuffW.USER32(?,?), ref: 00A74A61
                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A74AAC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharMessageSendUpper
                                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                • API String ID: 3974292440-4258414348
                                                                • Opcode ID: 62f6e3c036b3d8aad502ed0f31eceed02c3f8a7a1813b7dc302292bbb0ffb8e7
                                                                • Instruction ID: 8755adfd0946222cf255d7320ea4c3246e99cb10c5ed0472f19f8a821e89538c
                                                                • Opcode Fuzzy Hash: 62f6e3c036b3d8aad502ed0f31eceed02c3f8a7a1813b7dc302292bbb0ffb8e7
                                                                • Instruction Fuzzy Hash: FB916C342047159FCB04EF20C951ABAB7A1BF98354F11C968F99A5B3A2DB31FD49CB81
                                                                APIs
                                                                • GetLocalTime.KERNEL32(?), ref: 00A5E31F
                                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00A5E32F
                                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00A5E33B
                                                                • __wsplitpath.LIBCMT ref: 00A5E399
                                                                • _wcscat.LIBCMT ref: 00A5E3B1
                                                                • _wcscat.LIBCMT ref: 00A5E3C3
                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00A5E3D8
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A5E3EC
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A5E41E
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A5E43F
                                                                • _wcscpy.LIBCMT ref: 00A5E44B
                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00A5E48A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                                • String ID: *.*
                                                                • API String ID: 3566783562-438819550
                                                                • Opcode ID: 1880c1209e2f8afbb81d6e3cceab756fa921cc93fe143eecb97fc5fd9037ac35
                                                                • Instruction ID: 71247ea8e52406ba55c177ac791993b094295f85a8f76f2d8b0e997413fbe285
                                                                • Opcode Fuzzy Hash: 1880c1209e2f8afbb81d6e3cceab756fa921cc93fe143eecb97fc5fd9037ac35
                                                                • Instruction Fuzzy Hash: 9F613B725042459FC714EF64C844AAFB3E8FF89314F04491EFA9987251EB35EA49CB92
                                                                APIs
                                                                • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00A5A2C2
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00A5A2E3
                                                                • __swprintf.LIBCMT ref: 00A5A33C
                                                                • __swprintf.LIBCMT ref: 00A5A355
                                                                • _wprintf.LIBCMT ref: 00A5A3FC
                                                                • _wprintf.LIBCMT ref: 00A5A41A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: LoadString__swprintf_wprintf$_memmove
                                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                • API String ID: 311963372-3080491070
                                                                • Opcode ID: 39f1177ed9887974f18212d6303ae1c8cbf5a1d4c359451d8c51effe5d66db12
                                                                • Instruction ID: 187dd2f4a9c04c845eb26d0dd090978cb1d19b6eebba127000664c4b54b21f01
                                                                • Opcode Fuzzy Hash: 39f1177ed9887974f18212d6303ae1c8cbf5a1d4c359451d8c51effe5d66db12
                                                                • Instruction Fuzzy Hash: B2519E72900219BACF15EBE0DE86EEEB779BF14341F100265F505B20A2EB712F59CB61
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000000,?,00A3F8B8,00000001,0000138C,00000001,00000000,00000001,?,00A63FF9,00000000), ref: 00A5009A
                                                                • LoadStringW.USER32(00000000,?,00A3F8B8,00000001), ref: 00A500A3
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                • GetModuleHandleW.KERNEL32(00000000,00AB7310,?,00000FFF,?,?,00A3F8B8,00000001,0000138C,00000001,00000000,00000001,?,00A63FF9,00000000,00000001), ref: 00A500C5
                                                                • LoadStringW.USER32(00000000,?,00A3F8B8,00000001), ref: 00A500C8
                                                                • __swprintf.LIBCMT ref: 00A50118
                                                                • __swprintf.LIBCMT ref: 00A50129
                                                                • _wprintf.LIBCMT ref: 00A501D2
                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A501E9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                • API String ID: 984253442-2268648507
                                                                • Opcode ID: 5fa9d7545aed5d2bec1f025332f41e1dbb271da1c403e438c44a0bdad395015b
                                                                • Instruction ID: e1d26026093eb4c49caec86571b7382facb7c477d89782f0481f7ecf4c34226b
                                                                • Opcode Fuzzy Hash: 5fa9d7545aed5d2bec1f025332f41e1dbb271da1c403e438c44a0bdad395015b
                                                                • Instruction Fuzzy Hash: 34413C7280021DAACF15EBE0DE96EEEB778AF18381F500165F505B20D2EB756F49CB61
                                                                APIs
                                                                  • Part of subcall function 009F4D37: __itow.LIBCMT ref: 009F4D62
                                                                  • Part of subcall function 009F4D37: __swprintf.LIBCMT ref: 009F4DAC
                                                                • CharLowerBuffW.USER32(?,?), ref: 00A5AA0E
                                                                • GetDriveTypeW.KERNEL32 ref: 00A5AA5B
                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A5AAA3
                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A5AADA
                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A5AB08
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                • API String ID: 2698844021-4113822522
                                                                • Opcode ID: 276e25189df10be824f05788cc70171d07a5ad961857c427b663a188fec3cb9a
                                                                • Instruction ID: cdd74fa476c1c98540eb6b1736986582b35a744c6306b032943301d990dd5c44
                                                                • Opcode Fuzzy Hash: 276e25189df10be824f05788cc70171d07a5ad961857c427b663a188fec3cb9a
                                                                • Instruction Fuzzy Hash: 92513B712042099FC700EF10D9919AAB7E5FF98758F10896DF896572A2DB31AE09CB92
                                                                APIs
                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A5A852
                                                                • __swprintf.LIBCMT ref: 00A5A874
                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A5A8B1
                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00A5A8D6
                                                                • _memset.LIBCMT ref: 00A5A8F5
                                                                • _wcsncpy.LIBCMT ref: 00A5A931
                                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00A5A966
                                                                • CloseHandle.KERNEL32(00000000), ref: 00A5A971
                                                                • RemoveDirectoryW.KERNEL32(?), ref: 00A5A97A
                                                                • CloseHandle.KERNEL32(00000000), ref: 00A5A984
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                • String ID: :$\$\??\%s
                                                                • API String ID: 2733774712-3457252023
                                                                • Opcode ID: 15535bf3c0ae98c803d1ccc24f672974528f31255a0b21f1db9b3fe476e497e8
                                                                • Instruction ID: 1485f2e6be3a36f722371c518d815ba4860bbf82d2f18100c54c761df27ff71f
                                                                • Opcode Fuzzy Hash: 15535bf3c0ae98c803d1ccc24f672974528f31255a0b21f1db9b3fe476e497e8
                                                                • Instruction Fuzzy Hash: 7E31A57260021AABDB21DFA0DC49FEB77BCFF89711F1041B6FA08D6150E77096898B25
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00A7982C,?,?), ref: 00A7C0C8
                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00A7982C,?,?,00000000,?), ref: 00A7C0DF
                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00A7982C,?,?,00000000,?), ref: 00A7C0EA
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00A7982C,?,?,00000000,?), ref: 00A7C0F7
                                                                • GlobalLock.KERNEL32(00000000), ref: 00A7C100
                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00A7982C,?,?,00000000,?), ref: 00A7C10F
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00A7C118
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00A7982C,?,?,00000000,?), ref: 00A7C11F
                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00A7982C,?,?,00000000,?), ref: 00A7C130
                                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,00A83C7C,?), ref: 00A7C149
                                                                • GlobalFree.KERNEL32(00000000), ref: 00A7C159
                                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 00A7C17D
                                                                • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00A7C1A8
                                                                • DeleteObject.GDI32(00000000), ref: 00A7C1D0
                                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00A7C1E6
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                • String ID:
                                                                • API String ID: 3840717409-0
                                                                • Opcode ID: 6236d4c036e93f70bb5a7055621a54af38a1c9084ed0680c46a7c08cee41ca1d
                                                                • Instruction ID: e9c76a4f4412858db59b0ebca6b9262e01a058a0c47e3bb6f9689faf0a1e6237
                                                                • Opcode Fuzzy Hash: 6236d4c036e93f70bb5a7055621a54af38a1c9084ed0680c46a7c08cee41ca1d
                                                                • Instruction Fuzzy Hash: 6A414B71540204EFCB61DFA4DC8CEAA7BB8EF89721F108158F909E7261D7709946DB60
                                                                APIs
                                                                  • Part of subcall function 009F29E2: GetWindowLongW.USER32(?,000000EB), ref: 009F29F3
                                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00A7C8A4
                                                                • GetFocus.USER32 ref: 00A7C8B4
                                                                • GetDlgCtrlID.USER32(00000000), ref: 00A7C8BF
                                                                • _memset.LIBCMT ref: 00A7C9EA
                                                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00A7CA15
                                                                • GetMenuItemCount.USER32(?), ref: 00A7CA35
                                                                • GetMenuItemID.USER32(?,00000000), ref: 00A7CA48
                                                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00A7CA7C
                                                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00A7CAC4
                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A7CAFC
                                                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00A7CB31
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                • String ID: 0
                                                                • API String ID: 1296962147-4108050209
                                                                • Opcode ID: cf74a45e0fa7129f6a0b36e51a715cf33f715fd597e78cf12f6350699e65ec3e
                                                                • Instruction ID: 955311123dd1605d0374a283c78adfed218d996f6626c38e0182cdec852b8c4e
                                                                • Opcode Fuzzy Hash: cf74a45e0fa7129f6a0b36e51a715cf33f715fd597e78cf12f6350699e65ec3e
                                                                • Instruction Fuzzy Hash: 62815A71608305AFD710CF14CD85E6BBBE9EB88364F00C92DF99997291D770D945CBA2
                                                                APIs
                                                                  • Part of subcall function 00A48E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A48E3C
                                                                  • Part of subcall function 00A48E20: GetLastError.KERNEL32(?,00A48900,?,?,?), ref: 00A48E46
                                                                  • Part of subcall function 00A48E20: GetProcessHeap.KERNEL32(00000008,?,?,00A48900,?,?,?), ref: 00A48E55
                                                                  • Part of subcall function 00A48E20: HeapAlloc.KERNEL32(00000000,?,00A48900,?,?,?), ref: 00A48E5C
                                                                  • Part of subcall function 00A48E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A48E73
                                                                  • Part of subcall function 00A48EBD: GetProcessHeap.KERNEL32(00000008,00A48916,00000000,00000000,?,00A48916,?), ref: 00A48EC9
                                                                  • Part of subcall function 00A48EBD: HeapAlloc.KERNEL32(00000000,?,00A48916,?), ref: 00A48ED0
                                                                  • Part of subcall function 00A48EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00A48916,?), ref: 00A48EE1
                                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A48B2E
                                                                • _memset.LIBCMT ref: 00A48B43
                                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A48B62
                                                                • GetLengthSid.ADVAPI32(?), ref: 00A48B73
                                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00A48BB0
                                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A48BCC
                                                                • GetLengthSid.ADVAPI32(?), ref: 00A48BE9
                                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00A48BF8
                                                                • HeapAlloc.KERNEL32(00000000), ref: 00A48BFF
                                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A48C20
                                                                • CopySid.ADVAPI32(00000000), ref: 00A48C27
                                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A48C58
                                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A48C7E
                                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A48C92
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                                • String ID:
                                                                • API String ID: 3996160137-0
                                                                • Opcode ID: fc3addb2b130c14984275ff65a06db88d9a25e80936a80dcaf3186843f23cf4b
                                                                • Instruction ID: d6a4af48400a0c9eed1074ff6b345de92b0c045f622ccd1c85613dcb3797636d
                                                                • Opcode Fuzzy Hash: fc3addb2b130c14984275ff65a06db88d9a25e80936a80dcaf3186843f23cf4b
                                                                • Instruction Fuzzy Hash: 60615879900209EFDF10DFA5ED85EEEBBB9FF44300F048169E915A6290DB799A05CB60
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 00A67A79
                                                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00A67A85
                                                                • CreateCompatibleDC.GDI32(?), ref: 00A67A91
                                                                • SelectObject.GDI32(00000000,?), ref: 00A67A9E
                                                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00A67AF2
                                                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00A67B2E
                                                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00A67B52
                                                                • SelectObject.GDI32(00000006,?), ref: 00A67B5A
                                                                • DeleteObject.GDI32(?), ref: 00A67B63
                                                                • DeleteDC.GDI32(00000006), ref: 00A67B6A
                                                                • ReleaseDC.USER32(00000000,?), ref: 00A67B75
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                • String ID: (
                                                                • API String ID: 2598888154-3887548279
                                                                • Opcode ID: 7c0e7fe31caae287f2dce39e1f6c1960e97497177c50954f07d759841aab3324
                                                                • Instruction ID: 0fb2224fb1f6b3b744e7ec115c46b95ecb62576ae60a25a1db9617137ca93c91
                                                                • Opcode Fuzzy Hash: 7c0e7fe31caae287f2dce39e1f6c1960e97497177c50954f07d759841aab3324
                                                                • Instruction Fuzzy Hash: 86516972904309EFCB15CFA8DC85EAEBBB9EF48350F14851DF94AA7250D731A945CB60
                                                                APIs
                                                                • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00A5A4D4
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                • LoadStringW.USER32(?,?,00000FFF,?), ref: 00A5A4F6
                                                                • __swprintf.LIBCMT ref: 00A5A54F
                                                                • __swprintf.LIBCMT ref: 00A5A568
                                                                • _wprintf.LIBCMT ref: 00A5A61E
                                                                • _wprintf.LIBCMT ref: 00A5A63C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: LoadString__swprintf_wprintf$_memmove
                                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                • API String ID: 311963372-2391861430
                                                                • Opcode ID: 98103919de0bf308acd4eae3146637901db137e62243c27d248c89d1069dc7b8
                                                                • Instruction ID: a3a012a18d72778b94ac59e8b02673a9cd07dd8cf196649b9bd5cf3656541f03
                                                                • Opcode Fuzzy Hash: 98103919de0bf308acd4eae3146637901db137e62243c27d248c89d1069dc7b8
                                                                • Instruction Fuzzy Hash: B0517E72900119BACF15EBE0DE86EEEB779BF18341F104265F505620A2EB316F59CB61
                                                                APIs
                                                                  • Part of subcall function 00A5951A: __time64.LIBCMT ref: 00A59524
                                                                  • Part of subcall function 00A04A8C: _fseek.LIBCMT ref: 00A04AA4
                                                                • __wsplitpath.LIBCMT ref: 00A597EF
                                                                  • Part of subcall function 00A1431E: __wsplitpath_helper.LIBCMT ref: 00A1435E
                                                                • _wcscpy.LIBCMT ref: 00A59802
                                                                • _wcscat.LIBCMT ref: 00A59815
                                                                • __wsplitpath.LIBCMT ref: 00A5983A
                                                                • _wcscat.LIBCMT ref: 00A59850
                                                                • _wcscat.LIBCMT ref: 00A59863
                                                                  • Part of subcall function 00A59560: _memmove.LIBCMT ref: 00A59599
                                                                  • Part of subcall function 00A59560: _memmove.LIBCMT ref: 00A595A8
                                                                • _wcscmp.LIBCMT ref: 00A597AA
                                                                  • Part of subcall function 00A59CF1: _wcscmp.LIBCMT ref: 00A59DE1
                                                                  • Part of subcall function 00A59CF1: _wcscmp.LIBCMT ref: 00A59DF4
                                                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00A59A0D
                                                                • _wcsncpy.LIBCMT ref: 00A59A80
                                                                • DeleteFileW.KERNEL32(?,?), ref: 00A59AB6
                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A59ACC
                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A59ADD
                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A59AEF
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                • String ID:
                                                                • API String ID: 1500180987-0
                                                                • Opcode ID: d598dbef2620d3af01b7ba005c4d2e1c4d70d0bf65f9eaa9634749c59f891f19
                                                                • Instruction ID: 63df7423146ff20ab4df7a305c28e1b7d583585a8ed0cc3bbd391409bb1fdcae
                                                                • Opcode Fuzzy Hash: d598dbef2620d3af01b7ba005c4d2e1c4d70d0bf65f9eaa9634749c59f891f19
                                                                • Instruction Fuzzy Hash: 8FC13BB1900219AADF11DF94CD85ADFB7BDFF48350F0040AAFA09E6151EB709A898F65
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A05BF1
                                                                • GetMenuItemCount.USER32(00AB7890), ref: 00A40E7B
                                                                • GetMenuItemCount.USER32(00AB7890), ref: 00A40F2B
                                                                • GetCursorPos.USER32(?), ref: 00A40F6F
                                                                • SetForegroundWindow.USER32(00000000), ref: 00A40F78
                                                                • TrackPopupMenuEx.USER32(00AB7890,00000000,?,00000000,00000000,00000000), ref: 00A40F8B
                                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00A40F97
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                • String ID:
                                                                • API String ID: 2751501086-0
                                                                • Opcode ID: 2e6f062cd3e818c2088f95ab9d16cbce1bde51fae80b911039426386d9db6e82
                                                                • Instruction ID: 18cfad931de9fb700bd12b3f985204f62163572483b647ce0dfe819dab1e4019
                                                                • Opcode Fuzzy Hash: 2e6f062cd3e818c2088f95ab9d16cbce1bde51fae80b911039426386d9db6e82
                                                                • Instruction Fuzzy Hash: 2971F334A04609BFFB208B64DC85FAABF64FF45324F244216FA146A1D1C7B16C64EB90
                                                                APIs
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                • _memset.LIBCMT ref: 00A48489
                                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00A484BE
                                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00A484DA
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00A484F6
                                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00A48520
                                                                • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00A48548
                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A48553
                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00A48558
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                • API String ID: 1411258926-22481851
                                                                • Opcode ID: 5e14866c7559c57f3f87cb4cf7eb9e167414dff849a60848a2a8e1ac2d22585e
                                                                • Instruction ID: cef6247e998692d84cb8222d53d4116531208e3af55c30f17caf90d298784ad9
                                                                • Opcode Fuzzy Hash: 5e14866c7559c57f3f87cb4cf7eb9e167414dff849a60848a2a8e1ac2d22585e
                                                                • Instruction Fuzzy Hash: AC41F576C1022DABCF12EBE4ED95DEDB7B8BF58340F004529E805A31A1EB359E05CB90
                                                                APIs
                                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A7040D,?,?), ref: 00A71491
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharUpper
                                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                • API String ID: 3964851224-909552448
                                                                • Opcode ID: fae7e30129ba276d35a3866bba999e5fe3695440673664622046743e1a46f1c3
                                                                • Instruction ID: 0fa42a11891538aa244d4e9caa2b5612479eea89eebe573bd6c88358cd5f37fc
                                                                • Opcode Fuzzy Hash: fae7e30129ba276d35a3866bba999e5fe3695440673664622046743e1a46f1c3
                                                                • Instruction Fuzzy Hash: 1A413C7160025ACFDF04EF94ED41AEA37A4BF62310F508415FC565B292DB70ED9ACB61
                                                                APIs
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                  • Part of subcall function 00A0153B: _memmove.LIBCMT ref: 00A015C4
                                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00A558EB
                                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00A55901
                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A55912
                                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00A55924
                                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00A55935
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: SendString$_memmove
                                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                • API String ID: 2279737902-1007645807
                                                                • Opcode ID: 1829816c95d8233c831403d3bef2bf55bc50dfec3eb1a1789e545b3de45aa42e
                                                                • Instruction ID: 2432a56110d5d62c5cd218826b0e851ca1daa9a2f6a2fd4ae0277bea06dd8e4b
                                                                • Opcode Fuzzy Hash: 1829816c95d8233c831403d3bef2bf55bc50dfec3eb1a1789e545b3de45aa42e
                                                                • Instruction Fuzzy Hash: 6B11863195011DF9DB10A7A1EC5ADFF7B7CFB92B51F400829B811970D1DB701904C5B0
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                • String ID: 0.0.0.0
                                                                • API String ID: 208665112-3771769585
                                                                • Opcode ID: a8f99333c301d48f26237f809af6b5008a0ead8feccab0ea856d47a4de2c0d0a
                                                                • Instruction ID: 4fde47536647c4dccb2c3985ba9a3d373e2d27b4f9c66fb41c79be7638dbc81b
                                                                • Opcode Fuzzy Hash: a8f99333c301d48f26237f809af6b5008a0ead8feccab0ea856d47a4de2c0d0a
                                                                • Instruction Fuzzy Hash: 3C115931904108AFDB51F7749D4AEEA77BCEF84715F0001A5F84496092EF70D9CA8BA0
                                                                APIs
                                                                • timeGetTime.WINMM ref: 00A55535
                                                                  • Part of subcall function 00A10859: timeGetTime.WINMM(?,00000002,009FC22C), ref: 00A1085D
                                                                • Sleep.KERNEL32(0000000A), ref: 00A55561
                                                                • EnumThreadWindows.USER32(?,Function_000654E3,00000000), ref: 00A55585
                                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00A555A7
                                                                • SetActiveWindow.USER32 ref: 00A555C6
                                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00A555D4
                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00A555F3
                                                                • Sleep.KERNEL32(000000FA), ref: 00A555FE
                                                                • IsWindow.USER32 ref: 00A5560A
                                                                • EndDialog.USER32(00000000), ref: 00A5561B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                • String ID: BUTTON
                                                                • API String ID: 1194449130-3405671355
                                                                • Opcode ID: 0ea2f5f3c27ec338b9b20780ed309d7ad8d64bf2bffbd099b56ea274bdff0861
                                                                • Instruction ID: ef498fb4f610f6026bdd97e6f11c68021c5549c292eb441e5f17b90914d8079e
                                                                • Opcode Fuzzy Hash: 0ea2f5f3c27ec338b9b20780ed309d7ad8d64bf2bffbd099b56ea274bdff0861
                                                                • Instruction Fuzzy Hash: D5219570504604AFE791EBF4ED99F293B6EFB44346F041214F80281172DB755D5ADB71
                                                                APIs
                                                                  • Part of subcall function 009F4D37: __itow.LIBCMT ref: 009F4D62
                                                                  • Part of subcall function 009F4D37: __swprintf.LIBCMT ref: 009F4DAC
                                                                • CoInitialize.OLE32(00000000), ref: 00A5DC2D
                                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00A5DCC0
                                                                • SHGetDesktopFolder.SHELL32(?), ref: 00A5DCD4
                                                                • CoCreateInstance.OLE32(00A83D4C,00000000,00000001,00AAB86C,?), ref: 00A5DD20
                                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00A5DD8F
                                                                • CoTaskMemFree.OLE32(?,?), ref: 00A5DDE7
                                                                • _memset.LIBCMT ref: 00A5DE24
                                                                • SHBrowseForFolderW.SHELL32(?), ref: 00A5DE60
                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00A5DE83
                                                                • CoTaskMemFree.OLE32(00000000), ref: 00A5DE8A
                                                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00A5DEC1
                                                                • CoUninitialize.OLE32(00000001,00000000), ref: 00A5DEC3
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                • String ID:
                                                                • API String ID: 1246142700-0
                                                                • Opcode ID: e04fe07a4a2ee875c5596bf658ffc639f68cbd726e412f7167f2d3b1a48dc2c4
                                                                • Instruction ID: 4837cb45ef96d3eb40126ac2e47c1c430abc513ad106fc034811b015d40dca4a
                                                                • Opcode Fuzzy Hash: e04fe07a4a2ee875c5596bf658ffc639f68cbd726e412f7167f2d3b1a48dc2c4
                                                                • Instruction Fuzzy Hash: F3B1DA75A00109AFDB14DFA4C989DAEBBB9FF88305F148459F909EB261DB30EE45CB50
                                                                APIs
                                                                • GetKeyboardState.USER32(?), ref: 00A50896
                                                                • SetKeyboardState.USER32(?), ref: 00A50901
                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00A50921
                                                                • GetKeyState.USER32(000000A0), ref: 00A50938
                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00A50967
                                                                • GetKeyState.USER32(000000A1), ref: 00A50978
                                                                • GetAsyncKeyState.USER32(00000011), ref: 00A509A4
                                                                • GetKeyState.USER32(00000011), ref: 00A509B2
                                                                • GetAsyncKeyState.USER32(00000012), ref: 00A509DB
                                                                • GetKeyState.USER32(00000012), ref: 00A509E9
                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00A50A12
                                                                • GetKeyState.USER32(0000005B), ref: 00A50A20
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: State$Async$Keyboard
                                                                • String ID:
                                                                • API String ID: 541375521-0
                                                                • Opcode ID: a9daed6e5254914a7aeb72008c22e58e25a40e7b00169123b4a031f463ad0967
                                                                • Instruction ID: 4fc6f93fade39063878b904f7a31e3095d1da53b0a4553ca7e6503883795bb78
                                                                • Opcode Fuzzy Hash: a9daed6e5254914a7aeb72008c22e58e25a40e7b00169123b4a031f463ad0967
                                                                • Instruction Fuzzy Hash: DF51997090478469FB35DBB08915FAABFB4AF11381F088599DDC2571C3DA749A8CCBA1
                                                                APIs
                                                                • GetDlgItem.USER32(?,00000001), ref: 00A4CE1C
                                                                • GetWindowRect.USER32(00000000,?), ref: 00A4CE2E
                                                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00A4CE8C
                                                                • GetDlgItem.USER32(?,00000002), ref: 00A4CE97
                                                                • GetWindowRect.USER32(00000000,?), ref: 00A4CEA9
                                                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00A4CEFD
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00A4CF0B
                                                                • GetWindowRect.USER32(00000000,?), ref: 00A4CF1C
                                                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00A4CF5F
                                                                • GetDlgItem.USER32(?,000003EA), ref: 00A4CF6D
                                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A4CF8A
                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00A4CF97
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$ItemMoveRect$Invalidate
                                                                • String ID:
                                                                • API String ID: 3096461208-0
                                                                • Opcode ID: beaf6456320e98ab6fc3112b482cc6f991cdd373aa2f51dfbac128202e4a4889
                                                                • Instruction ID: f09e65e0c8e6b4d6dad7c0411dda99c8c6037c7b2036d65ac7cbff1e8a4e0add
                                                                • Opcode Fuzzy Hash: beaf6456320e98ab6fc3112b482cc6f991cdd373aa2f51dfbac128202e4a4889
                                                                • Instruction Fuzzy Hash: 96515375B00205AFDB58CFA9CD85EAEBBB6EF88710F14812DF519D7290D770AD058B50
                                                                APIs
                                                                  • Part of subcall function 009F1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009F2412,?,00000000,?,?,?,?,009F1AA7,00000000,?), ref: 009F1F76
                                                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 009F24AF
                                                                • KillTimer.USER32(-00000001,?,?,?,?,009F1AA7,00000000,?,?,009F1EBE,?,?), ref: 009F254A
                                                                • DestroyAcceleratorTable.USER32(00000000), ref: 00A2BFE7
                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009F1AA7,00000000,?,?,009F1EBE,?,?), ref: 00A2C018
                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009F1AA7,00000000,?,?,009F1EBE,?,?), ref: 00A2C02F
                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009F1AA7,00000000,?,?,009F1EBE,?,?), ref: 00A2C04B
                                                                • DeleteObject.GDI32(00000000), ref: 00A2C05D
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                • String ID:
                                                                • API String ID: 641708696-0
                                                                • Opcode ID: 12ed1887c14dd0443246092c609db5cf02751d0b6748747841d5af7d63aac38a
                                                                • Instruction ID: 6a82df0de66e53327c919bcb015fe01cfdd23468dcfcc85cfa43773b7a2541e5
                                                                • Opcode Fuzzy Hash: 12ed1887c14dd0443246092c609db5cf02751d0b6748747841d5af7d63aac38a
                                                                • Instruction Fuzzy Hash: 9961AC30108618DFDB25DF98DD48B3A77B1FB84322F108A28E14657AB0C7B5AC92DF91
                                                                APIs
                                                                  • Part of subcall function 009F29AB: GetWindowLongW.USER32(?,000000EB), ref: 009F29BC
                                                                • GetSysColor.USER32(0000000F), ref: 009F25AF
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ColorLongWindow
                                                                • String ID:
                                                                • API String ID: 259745315-0
                                                                • Opcode ID: a6f0263feab38da571f422cb20e1961a8d5deaa36a32ce5913d75b555e7e0e46
                                                                • Instruction ID: 89b1c2c9e35e5a4d5a1eb98e3a46ff66c7d718f2cb11afa37f5bf7c6e4650370
                                                                • Opcode Fuzzy Hash: a6f0263feab38da571f422cb20e1961a8d5deaa36a32ce5913d75b555e7e0e46
                                                                • Instruction Fuzzy Hash: A041C331004158AFDB259F68DC88BB93B65EB4A335F194362FE65CE1E6D7308C42EB21
                                                                APIs
                                                                  • Part of subcall function 00A10B8B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00A02A3E,?,00008000), ref: 00A10BA7
                                                                  • Part of subcall function 00A10284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00A02A58,?,00008000), ref: 00A102A4
                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00A02ADF
                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00A02C2C
                                                                  • Part of subcall function 00A03EBE: _wcscpy.LIBCMT ref: 00A03EF6
                                                                  • Part of subcall function 00A1386D: _iswctype.LIBCMT ref: 00A13875
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                • API String ID: 537147316-3738523708
                                                                • Opcode ID: 585b6756b9c81527aa79df74d064f615eb7c5d01dd6c813873dd5db4561cd85f
                                                                • Instruction ID: c80cf1129ef2280916c6e9c29f21ad8cbcc363aba2217ee0bb153faaef3918cc
                                                                • Opcode Fuzzy Hash: 585b6756b9c81527aa79df74d064f615eb7c5d01dd6c813873dd5db4561cd85f
                                                                • Instruction Fuzzy Hash: 7F02BD715083459FC724EF24DA81AAFBBF5BF89344F10092DF589932A2DB30DA49CB42
                                                                APIs
                                                                • CharLowerBuffW.USER32(?,?,00A80980), ref: 00A5AF4E
                                                                • GetDriveTypeW.KERNEL32(00000061,00AAB5F0,00000061), ref: 00A5B018
                                                                • _wcscpy.LIBCMT ref: 00A5B042
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharDriveLowerType_wcscpy
                                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                • API String ID: 2820617543-1000479233
                                                                • Opcode ID: c2325e11efcba946070eb73f64a9231b27b2a0bd89d1134a0805395f8c3206fd
                                                                • Instruction ID: f36b5ae102bd28caddace3eec7addd2b33f1034fb6c47c1720d2adcb248b649e
                                                                • Opcode Fuzzy Hash: c2325e11efcba946070eb73f64a9231b27b2a0bd89d1134a0805395f8c3206fd
                                                                • Instruction Fuzzy Hash: 4251BA702283099FC310EF14D991AABB7A5FFA0301F504919F996572E2EB70ED4DCB62
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __i64tow__itow__swprintf
                                                                • String ID: %.15g$0x%p$False$True
                                                                • API String ID: 421087845-2263619337
                                                                • Opcode ID: c196f4ff95386bbe1e245de736289f006352e8c399dc8ea6697b5936c939c25a
                                                                • Instruction ID: a9682ea5e8de07e53a1404c806939468695a5455d50fc494a27fdc0132aa9e86
                                                                • Opcode Fuzzy Hash: c196f4ff95386bbe1e245de736289f006352e8c399dc8ea6697b5936c939c25a
                                                                • Instruction Fuzzy Hash: 4D41C771604209AFDB34DF78D942EBA73F8EB45340F20486EE649D72D2EA71E941C711
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A7778F
                                                                • CreateMenu.USER32 ref: 00A777AA
                                                                • SetMenu.USER32(?,00000000), ref: 00A777B9
                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A77846
                                                                • IsMenu.USER32(?), ref: 00A7785C
                                                                • CreatePopupMenu.USER32 ref: 00A77866
                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A77893
                                                                • DrawMenuBar.USER32 ref: 00A7789B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                • String ID: 0$F
                                                                • API String ID: 176399719-3044882817
                                                                • Opcode ID: 89ff1e4805c94ae64d31053ab43cf60f715fc6df39996b4e2fc3de417cd2ed19
                                                                • Instruction ID: 373f6422b44e72ba43dfe3dbb3f8ef1a019739bfad93d222b8a68a697677c79f
                                                                • Opcode Fuzzy Hash: 89ff1e4805c94ae64d31053ab43cf60f715fc6df39996b4e2fc3de417cd2ed19
                                                                • Instruction Fuzzy Hash: E4416775A00209EFDB10DFA4D888E9ABBB5FF49300F158128F949A7361D730A955CF60
                                                                APIs
                                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00A77B83
                                                                • CreateCompatibleDC.GDI32(00000000), ref: 00A77B8A
                                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00A77B9D
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00A77BA5
                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A77BB0
                                                                • DeleteDC.GDI32(00000000), ref: 00A77BB9
                                                                • GetWindowLongW.USER32(?,000000EC), ref: 00A77BC3
                                                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00A77BD7
                                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00A77BE3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                • String ID: static
                                                                • API String ID: 2559357485-2160076837
                                                                • Opcode ID: 9e47a4df8020f86bb3eaeee5142a76ca539dd77561a6ad2f3c81223e6d76ecd2
                                                                • Instruction ID: 9f6bc39ba0c53444dc85854c3ce2996c51350b5b8734958892279cdb59fc1781
                                                                • Opcode Fuzzy Hash: 9e47a4df8020f86bb3eaeee5142a76ca539dd77561a6ad2f3c81223e6d76ecd2
                                                                • Instruction Fuzzy Hash: D5318D32104218ABDF119FA4DC49FDF3B69FF49320F108324FA5AA61A0C771D825DBA4
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A1706B
                                                                  • Part of subcall function 00A18D58: __getptd_noexit.LIBCMT ref: 00A18D58
                                                                • __gmtime64_s.LIBCMT ref: 00A17104
                                                                • __gmtime64_s.LIBCMT ref: 00A1713A
                                                                • __gmtime64_s.LIBCMT ref: 00A17157
                                                                • __allrem.LIBCMT ref: 00A171AD
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A171C9
                                                                • __allrem.LIBCMT ref: 00A171E0
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A171FE
                                                                • __allrem.LIBCMT ref: 00A17215
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A17233
                                                                • __invoke_watson.LIBCMT ref: 00A172A4
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                • String ID:
                                                                • API String ID: 384356119-0
                                                                • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                                • Instruction ID: 980f0bd798115bbbf9d684a16aa59f833904ef1ec7df4acb1358ca360ea752da
                                                                • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                                • Instruction Fuzzy Hash: 6E711672A04716ABDB149F7DDD41BDEB3B9AF15320F14423AF514E7281E770DA808B90
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A52CE9
                                                                • GetMenuItemInfoW.USER32(00AB7890,000000FF,00000000,00000030), ref: 00A52D4A
                                                                • SetMenuItemInfoW.USER32(00AB7890,00000004,00000000,00000030), ref: 00A52D80
                                                                • Sleep.KERNEL32(000001F4), ref: 00A52D92
                                                                • GetMenuItemCount.USER32(?), ref: 00A52DD6
                                                                • GetMenuItemID.USER32(?,00000000), ref: 00A52DF2
                                                                • GetMenuItemID.USER32(?,-00000001), ref: 00A52E1C
                                                                • GetMenuItemID.USER32(?,?), ref: 00A52E61
                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A52EA7
                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A52EBB
                                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A52EDC
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                • String ID:
                                                                • API String ID: 4176008265-0
                                                                • Opcode ID: 93dc03b0e67bc245a81b64cd0e187ee537191664077d731f906c2361cba25fde
                                                                • Instruction ID: d226bea3616717f18982e257667defd2cdbe01e7c6293c7f397a6acabad45d4f
                                                                • Opcode Fuzzy Hash: 93dc03b0e67bc245a81b64cd0e187ee537191664077d731f906c2361cba25fde
                                                                • Instruction Fuzzy Hash: 4B617BB1900249AFDB21CFA4DD89EAEBFB9FB42306F144559FC41A7251D731AD0ADB20
                                                                APIs
                                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A775CA
                                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00A775CD
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A775F1
                                                                • _memset.LIBCMT ref: 00A77602
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A77614
                                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00A7768C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$LongWindow_memset
                                                                • String ID:
                                                                • API String ID: 830647256-0
                                                                • Opcode ID: cdddae980abc3244d287734d44927ded069369796ba4a6d51fefc86473a87b62
                                                                • Instruction ID: bb9e14936eaee339821f89e7a86dbf0aa96e9295d29c6969c7c88d5027faf5ee
                                                                • Opcode Fuzzy Hash: cdddae980abc3244d287734d44927ded069369796ba4a6d51fefc86473a87b62
                                                                • Instruction Fuzzy Hash: 17617D75904208AFDB10DFA4CD85EEE77F8EB49710F108199FA18E72A2D770AD41DBA0
                                                                APIs
                                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00A477DD
                                                                • SafeArrayAllocData.OLEAUT32(?), ref: 00A47836
                                                                • VariantInit.OLEAUT32(?), ref: 00A47848
                                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00A47868
                                                                • VariantCopy.OLEAUT32(?,?), ref: 00A478BB
                                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00A478CF
                                                                • VariantClear.OLEAUT32(?), ref: 00A478E4
                                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 00A478F1
                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A478FA
                                                                • VariantClear.OLEAUT32(?), ref: 00A4790C
                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A47917
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                • String ID:
                                                                • API String ID: 2706829360-0
                                                                • Opcode ID: 70939890b0355c39030e0b01bbae24e5169d3cca65ceb53897381e2d8ff4b7f7
                                                                • Instruction ID: 5eccf0ac9c4612596c4cc1bfc91fbf695971589a772903a564b372d4195858e4
                                                                • Opcode Fuzzy Hash: 70939890b0355c39030e0b01bbae24e5169d3cca65ceb53897381e2d8ff4b7f7
                                                                • Instruction Fuzzy Hash: DF414439A04119DFDB04DFA8D848DEDBBB9FF48354F008069EA55A7261D770A94ACF90
                                                                APIs
                                                                • GetKeyboardState.USER32(?), ref: 00A50530
                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00A505B1
                                                                • GetKeyState.USER32(000000A0), ref: 00A505CC
                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00A505E6
                                                                • GetKeyState.USER32(000000A1), ref: 00A505FB
                                                                • GetAsyncKeyState.USER32(00000011), ref: 00A50613
                                                                • GetKeyState.USER32(00000011), ref: 00A50625
                                                                • GetAsyncKeyState.USER32(00000012), ref: 00A5063D
                                                                • GetKeyState.USER32(00000012), ref: 00A5064F
                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00A50667
                                                                • GetKeyState.USER32(0000005B), ref: 00A50679
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: State$Async$Keyboard
                                                                • String ID:
                                                                • API String ID: 541375521-0
                                                                • Opcode ID: 40fbe778afc6874cbdcff64e786bb8d0fbcf01ab3cfa34ce3deac8555cec5649
                                                                • Instruction ID: 858ad40ec147095727bb0f6a34a69a0b681a9e4974e11584607662759ae195db
                                                                • Opcode Fuzzy Hash: 40fbe778afc6874cbdcff64e786bb8d0fbcf01ab3cfa34ce3deac8555cec5649
                                                                • Instruction Fuzzy Hash: 764193705047CA6DFF7187648904BB6BEA07F51345F08805ADDC6479C2EBF899DC8BA2
                                                                APIs
                                                                  • Part of subcall function 009F4D37: __itow.LIBCMT ref: 009F4D62
                                                                  • Part of subcall function 009F4D37: __swprintf.LIBCMT ref: 009F4DAC
                                                                • CoInitialize.OLE32 ref: 00A68AED
                                                                • CoUninitialize.OLE32 ref: 00A68AF8
                                                                • CoCreateInstance.OLE32(?,00000000,00000017,00A83BBC,?), ref: 00A68B58
                                                                • IIDFromString.OLE32(?,?), ref: 00A68BCB
                                                                • VariantInit.OLEAUT32(?), ref: 00A68C65
                                                                • VariantClear.OLEAUT32(?), ref: 00A68CC6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                • API String ID: 834269672-1287834457
                                                                • Opcode ID: 26b84797db7e3bfc4342ed70be2dfa0edd4869322453761c0463343ddf946b3c
                                                                • Instruction ID: 2b1d95a91c80ed2b524d85e7f23d9330b4a541343bf4427ed832845e2db1f448
                                                                • Opcode Fuzzy Hash: 26b84797db7e3bfc4342ed70be2dfa0edd4869322453761c0463343ddf946b3c
                                                                • Instruction Fuzzy Hash: D3616E70208711AFC710DF54C889F6EB7F8AF89714F100959F9859B291CB78ED49CBA2
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00000001), ref: 00A5BB13
                                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00A5BB89
                                                                • GetLastError.KERNEL32 ref: 00A5BB93
                                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 00A5BC00
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                • API String ID: 4194297153-14809454
                                                                • Opcode ID: 88947515b479fe0e400f61a95d7b9a1b63b6d079d3c62cd3a4e2b1b980ff1ffb
                                                                • Instruction ID: fb966f417b99df5b0b40641d1a6754317ea56fafa02b607affebfad4ca0ebb61
                                                                • Opcode Fuzzy Hash: 88947515b479fe0e400f61a95d7b9a1b63b6d079d3c62cd3a4e2b1b980ff1ffb
                                                                • Instruction Fuzzy Hash: 1C31B235A10209AFCB10DF68CC85EBEB7B4FF44302F158066E905D72D6DBB19949CBA1
                                                                APIs
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                  • Part of subcall function 00A4B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B7BD
                                                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00A49BCC
                                                                • GetDlgCtrlID.USER32 ref: 00A49BD7
                                                                • GetParent.USER32 ref: 00A49BF3
                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A49BF6
                                                                • GetDlgCtrlID.USER32(?), ref: 00A49BFF
                                                                • GetParent.USER32(?), ref: 00A49C1B
                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A49C1E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                • String ID: ComboBox$ListBox
                                                                • API String ID: 1536045017-1403004172
                                                                • Opcode ID: 243ad98fd9b4fc47552aa9dba09dae95067b3f146333355609810dc54e828a77
                                                                • Instruction ID: 4eeebb9e59ed3e74ac0bc4ccc64156484795de3c0bf4e404d16beff82baa9d2f
                                                                • Opcode Fuzzy Hash: 243ad98fd9b4fc47552aa9dba09dae95067b3f146333355609810dc54e828a77
                                                                • Instruction Fuzzy Hash: 49219A75A00108BFDF04EBA0DC85EEFBBA9EF95310F100115B961932E1EB75882A9B20
                                                                APIs
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                  • Part of subcall function 00A4B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B7BD
                                                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00A49CB5
                                                                • GetDlgCtrlID.USER32 ref: 00A49CC0
                                                                • GetParent.USER32 ref: 00A49CDC
                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A49CDF
                                                                • GetDlgCtrlID.USER32(?), ref: 00A49CE8
                                                                • GetParent.USER32(?), ref: 00A49D04
                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A49D07
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                • String ID: ComboBox$ListBox
                                                                • API String ID: 1536045017-1403004172
                                                                • Opcode ID: bbd22b089093f89bc0ec0010f978c95d0f2559b467c5f739d5b18fba00ad4a6d
                                                                • Instruction ID: 73bc3665c2842e9f8e45ebaf9a0333b16459f77055e314e44893161431a8f416
                                                                • Opcode Fuzzy Hash: bbd22b089093f89bc0ec0010f978c95d0f2559b467c5f739d5b18fba00ad4a6d
                                                                • Instruction Fuzzy Hash: 69219D75E41108BFDB00EBA0CD85EFFBBB9EF95300F100115B95197291EB7589299B20
                                                                APIs
                                                                • GetParent.USER32 ref: 00A49D27
                                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00A49D3C
                                                                • _wcscmp.LIBCMT ref: 00A49D4E
                                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00A49DC9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ClassMessageNameParentSend_wcscmp
                                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                • API String ID: 1704125052-3381328864
                                                                • Opcode ID: 31608f110d177412b6d68b6e1c36c0f32d83b3977d25d7f806c17d175a91f84d
                                                                • Instruction ID: edbb12c00739ee44b9d4a4b9bbcd8bc8f382ef9278c45b7000b36e4fba19e90e
                                                                • Opcode Fuzzy Hash: 31608f110d177412b6d68b6e1c36c0f32d83b3977d25d7f806c17d175a91f84d
                                                                • Instruction Fuzzy Hash: CB11067BA48303BAFE146B20EC06DE773ECEF55320F200126FA00A50D1FBA56A615A55
                                                                APIs
                                                                • VariantInit.OLEAUT32(?), ref: 00A68FC1
                                                                • CoInitialize.OLE32(00000000), ref: 00A68FEE
                                                                • CoUninitialize.OLE32 ref: 00A68FF8
                                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00A690F8
                                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00A69225
                                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00A83BDC), ref: 00A69259
                                                                • CoGetObject.OLE32(?,00000000,00A83BDC,?), ref: 00A6927C
                                                                • SetErrorMode.KERNEL32(00000000), ref: 00A6928F
                                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00A6930F
                                                                • VariantClear.OLEAUT32(?), ref: 00A6931F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                • String ID:
                                                                • API String ID: 2395222682-0
                                                                • Opcode ID: 2b0fceaea2f6d146ccdfccca0da69eebb99bbe9c6d6bfeb7c8dd7f6c72d50c28
                                                                • Instruction ID: a843a34db51c394e4c61cff6ca158a83d5aab7435abbbe8f0d3f403ed60c6d48
                                                                • Opcode Fuzzy Hash: 2b0fceaea2f6d146ccdfccca0da69eebb99bbe9c6d6bfeb7c8dd7f6c72d50c28
                                                                • Instruction Fuzzy Hash: B1C110B1208305AF9740EF68C88496BB7F9BF89748F10491DF98A9B251DB71ED06CB52
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 00A519EF
                                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00A50A67,?,00000001), ref: 00A51A03
                                                                • GetWindowThreadProcessId.USER32(00000000), ref: 00A51A0A
                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A50A67,?,00000001), ref: 00A51A19
                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A51A2B
                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A50A67,?,00000001), ref: 00A51A44
                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A50A67,?,00000001), ref: 00A51A56
                                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00A50A67,?,00000001), ref: 00A51A9B
                                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00A50A67,?,00000001), ref: 00A51AB0
                                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00A50A67,?,00000001), ref: 00A51ABB
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                • String ID:
                                                                • API String ID: 2156557900-0
                                                                • Opcode ID: e8ebcb815b18bd44c2943d4eab5f766bb92f4c0d8c9b22323a1cb7261b372ce1
                                                                • Instruction ID: fb67d63221061db23a756158fdba5e577895d91018756c0db893777dd70deb1e
                                                                • Opcode Fuzzy Hash: e8ebcb815b18bd44c2943d4eab5f766bb92f4c0d8c9b22323a1cb7261b372ce1
                                                                • Instruction Fuzzy Hash: 0831CE75501204AFDB22DFA8DC88F7977AEFB64356F104215FE00861A1DBB89D89CB10
                                                                APIs
                                                                • GetSysColor.USER32(00000008), ref: 009F260D
                                                                • SetTextColor.GDI32(?,000000FF), ref: 009F2617
                                                                • SetBkMode.GDI32(?,00000001), ref: 009F262C
                                                                • GetStockObject.GDI32(00000005), ref: 009F2634
                                                                • GetClientRect.USER32(?), ref: 00A2C0FC
                                                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 00A2C113
                                                                • GetWindowDC.USER32(?), ref: 00A2C11F
                                                                • GetPixel.GDI32(00000000,?,?), ref: 00A2C12E
                                                                • ReleaseDC.USER32(?,00000000), ref: 00A2C140
                                                                • GetSysColor.USER32(00000005), ref: 00A2C15E
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                                • String ID:
                                                                • API String ID: 3430376129-0
                                                                • Opcode ID: 302656abd9628bfd4ec38fe15506c2d829ef7d5e3f6aa1816939d187608eea88
                                                                • Instruction ID: 451a4144d72f10c9674acc5cb4df52b634554fb38d04df2f4fb65ce15f34d8f9
                                                                • Opcode Fuzzy Hash: 302656abd9628bfd4ec38fe15506c2d829ef7d5e3f6aa1816939d187608eea88
                                                                • Instruction Fuzzy Hash: 56113A32500245BFDBA19FA4EC49FE97BA5EF48331F104265FA65950E1CB710956EF20
                                                                APIs
                                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 009FADE1
                                                                • OleUninitialize.OLE32(?,00000000), ref: 009FAE80
                                                                • UnregisterHotKey.USER32(?), ref: 009FAFD7
                                                                • DestroyWindow.USER32(?), ref: 00A32F64
                                                                • FreeLibrary.KERNEL32(?), ref: 00A32FC9
                                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00A32FF6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                • String ID: close all
                                                                • API String ID: 469580280-3243417748
                                                                • Opcode ID: 485b5ab5360fc9ac0ff09f2faac7e848d9e2158f50b6e54d1edbdd7824ce18d1
                                                                • Instruction ID: 74fbccfb57bf156060d4569d83a1ef427fe3b01918141eb6c2796c6ce80310d0
                                                                • Opcode Fuzzy Hash: 485b5ab5360fc9ac0ff09f2faac7e848d9e2158f50b6e54d1edbdd7824ce18d1
                                                                • Instruction Fuzzy Hash: DBA169717052168FCB29EF54C995F69F364BF04700F1442ACF90AAB2A1DB31AD56CF91
                                                                APIs
                                                                • EnumChildWindows.USER32(?,00A4B13A), ref: 00A4B078
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ChildEnumWindows
                                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                • API String ID: 3555792229-1603158881
                                                                • Opcode ID: c1622795f9e2c792e7b81e85c1d3d7663bcb52cb740af3e953bf8aa7dcaaa22e
                                                                • Instruction ID: c013cfc9c1ec36df4049ad87f94800c52678980160ce3c4297c5943f6b072b6b
                                                                • Opcode Fuzzy Hash: c1622795f9e2c792e7b81e85c1d3d7663bcb52cb740af3e953bf8aa7dcaaa22e
                                                                • Instruction Fuzzy Hash: EF91E874600106EFDB58EF60C581BEEFB74BFA4300F548119E86AA7191DF30A99DCBA1
                                                                APIs
                                                                • SetWindowLongW.USER32(?,000000EB), ref: 009F327E
                                                                  • Part of subcall function 009F218F: GetClientRect.USER32(?,?), ref: 009F21B8
                                                                  • Part of subcall function 009F218F: GetWindowRect.USER32(?,?), ref: 009F21F9
                                                                  • Part of subcall function 009F218F: ScreenToClient.USER32(?,?), ref: 009F2221
                                                                • GetDC.USER32 ref: 00A2D073
                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00A2D086
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00A2D094
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00A2D0A9
                                                                • ReleaseDC.USER32(?,00000000), ref: 00A2D0B1
                                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00A2D13C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                • String ID: U
                                                                • API String ID: 4009187628-3372436214
                                                                • Opcode ID: f864b2461e91947ad2840b2edcf07b6c189258063cfdb95c6cd6574ce4192901
                                                                • Instruction ID: 86e742d182a47474117d998dbd27c4a4d39812f362346e79bbe1bf9d48de4994
                                                                • Opcode Fuzzy Hash: f864b2461e91947ad2840b2edcf07b6c189258063cfdb95c6cd6574ce4192901
                                                                • Instruction Fuzzy Hash: 2671E130404219DFCF21CFA8D884AFA7BB5FF49320F148279EE565A1A7C7358992DB60
                                                                APIs
                                                                  • Part of subcall function 009F29E2: GetWindowLongW.USER32(?,000000EB), ref: 009F29F3
                                                                  • Part of subcall function 009F2714: GetCursorPos.USER32(?), ref: 009F2727
                                                                  • Part of subcall function 009F2714: ScreenToClient.USER32(00AB77B0,?), ref: 009F2744
                                                                  • Part of subcall function 009F2714: GetAsyncKeyState.USER32(00000001), ref: 009F2769
                                                                  • Part of subcall function 009F2714: GetAsyncKeyState.USER32(00000002), ref: 009F2777
                                                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00A7C69C
                                                                • ImageList_EndDrag.COMCTL32 ref: 00A7C6A2
                                                                • ReleaseCapture.USER32 ref: 00A7C6A8
                                                                • SetWindowTextW.USER32(?,00000000), ref: 00A7C752
                                                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00A7C765
                                                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00A7C847
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                • API String ID: 1924731296-2107944366
                                                                • Opcode ID: 62ad91957094197efc82370ce58962c8511e583c90ca53739f993e8505537619
                                                                • Instruction ID: ce959e2e2e251e2bbd2452885fd9ca655253c32cc292efc85d87cc0da84f6036
                                                                • Opcode Fuzzy Hash: 62ad91957094197efc82370ce58962c8511e583c90ca53739f993e8505537619
                                                                • Instruction Fuzzy Hash: 21518D71604304AFD704EF54CC9AFAA7BE5FB88310F008A1DF599872E2DB70A955CB52
                                                                APIs
                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A6211C
                                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00A62148
                                                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00A6218A
                                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00A6219F
                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00A621AC
                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00A621DC
                                                                • InternetCloseHandle.WININET(00000000), ref: 00A62223
                                                                  • Part of subcall function 00A62B4F: GetLastError.KERNEL32(?,?,00A61EE3,00000000,00000000,00000001), ref: 00A62B64
                                                                  • Part of subcall function 00A62B4F: SetEvent.KERNEL32(?,?,00A61EE3,00000000,00000000,00000001), ref: 00A62B79
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                                • String ID:
                                                                • API String ID: 2603140658-3916222277
                                                                • Opcode ID: 92e6a89a46ff95a06b99f98d5e4c81397dd8059c55fdaea7e3bc915db73186c9
                                                                • Instruction ID: 30a73aae998779cc2b0527a2c1c1a37a56e43318f8ae834cddfd6f75ccfb3676
                                                                • Opcode Fuzzy Hash: 92e6a89a46ff95a06b99f98d5e4c81397dd8059c55fdaea7e3bc915db73186c9
                                                                • Instruction Fuzzy Hash: 75417EB1501A18BFEB129F60CC89FFB7BBCEF08354F004116FA159A191D7749E458BA1
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00A80980), ref: 00A69412
                                                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00A80980), ref: 00A69446
                                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00A695C0
                                                                • SysFreeString.OLEAUT32(?), ref: 00A695EA
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                • String ID:
                                                                • API String ID: 560350794-0
                                                                • Opcode ID: ca0dad09837d07268fcccff3c7aa354ac8b2be2aff60ace341824ff501bbe22f
                                                                • Instruction ID: 22e71d14e6f9be3353fc9734df270d683225b94db8686f2aab968d093c4b759f
                                                                • Opcode Fuzzy Hash: ca0dad09837d07268fcccff3c7aa354ac8b2be2aff60ace341824ff501bbe22f
                                                                • Instruction Fuzzy Hash: 5DF14D75A00209EFDF15DFA4C884EAEB7B9FF89314F108058F916AB251DB31AE46CB50
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A6FD9E
                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A6FF31
                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A6FF55
                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A6FF95
                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A6FFB7
                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A70133
                                                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00A70165
                                                                • CloseHandle.KERNEL32(?), ref: 00A70194
                                                                • CloseHandle.KERNEL32(?), ref: 00A7020B
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                • String ID:
                                                                • API String ID: 4090791747-0
                                                                • Opcode ID: ecd24315202934ad0cbef97cdbcfc59ffd0b6e8d09d9567341e18dea530380e3
                                                                • Instruction ID: 0eb13a6e0afb29f93a8b517d117d0ccad26b14933330295ba42447d8d2d5d4a4
                                                                • Opcode Fuzzy Hash: ecd24315202934ad0cbef97cdbcfc59ffd0b6e8d09d9567341e18dea530380e3
                                                                • Instruction Fuzzy Hash: FBE19C31204301DFC714EF24D991B6ABBE1BF89314F14896DF9999B2A2DB31EC45CB52
                                                                APIs
                                                                  • Part of subcall function 00A54BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A53B8A,?), ref: 00A54BE0
                                                                  • Part of subcall function 00A54BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A53B8A,?), ref: 00A54BF9
                                                                  • Part of subcall function 00A54FEC: GetFileAttributesW.KERNEL32(?,00A53BFE), ref: 00A54FED
                                                                • lstrcmpiW.KERNEL32(?,?), ref: 00A552FB
                                                                • _wcscmp.LIBCMT ref: 00A55315
                                                                • MoveFileW.KERNEL32(?,?), ref: 00A55330
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                • String ID:
                                                                • API String ID: 793581249-0
                                                                • Opcode ID: 9d5a5d0b4e426f28048bf4fe5d9cbdd3e5dfbc9cfd27fc4d89df4811207654ad
                                                                • Instruction ID: fb303c62bb6acb6d181d975f76fe45d66a66136bbfcc7efef24000823e8e6499
                                                                • Opcode Fuzzy Hash: 9d5a5d0b4e426f28048bf4fe5d9cbdd3e5dfbc9cfd27fc4d89df4811207654ad
                                                                • Instruction Fuzzy Hash: 865193B24083859BC764DBA4D9919DFB3ECAF84341F00091EF589C3092EF30E68D8766
                                                                APIs
                                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00A78D24
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: InvalidateRect
                                                                • String ID:
                                                                • API String ID: 634782764-0
                                                                • Opcode ID: 714b9bb6a2d07fb40fa83dc8e6d2d9adc0c98d2fda84a9959f3ce30b814052d2
                                                                • Instruction ID: 2d32733c7f405b500319096eafb7d5352a1cbfeb19644dbaeb13ffe1c7a1047a
                                                                • Opcode Fuzzy Hash: 714b9bb6a2d07fb40fa83dc8e6d2d9adc0c98d2fda84a9959f3ce30b814052d2
                                                                • Instruction Fuzzy Hash: AD51A030680204BFEF759B68CC8DBA97B65AF05360F24C511FA18E61E2CF79E990CB50
                                                                APIs
                                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00A2C638
                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A2C65A
                                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00A2C672
                                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00A2C690
                                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00A2C6B1
                                                                • DestroyIcon.USER32(00000000), ref: 00A2C6C0
                                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00A2C6DD
                                                                • DestroyIcon.USER32(?), ref: 00A2C6EC
                                                                  • Part of subcall function 00A7AAD4: DeleteObject.GDI32(00000000), ref: 00A7AB0D
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                • String ID:
                                                                • API String ID: 2819616528-0
                                                                • Opcode ID: dd0dd07f929ee2bff7f476a8618cc6fe77d2295bfcf2b5deaaf2d8b9c2f2badf
                                                                • Instruction ID: 613d5953778e48d94c66b376c9a343f0d2b81563fd7297cfc06adfd0e351d481
                                                                • Opcode Fuzzy Hash: dd0dd07f929ee2bff7f476a8618cc6fe77d2295bfcf2b5deaaf2d8b9c2f2badf
                                                                • Instruction Fuzzy Hash: B5517B70610209AFDB20DF68DD45FBA7BB5FB48720F104528FA46972A0D7B4ED91DB50
                                                                APIs
                                                                  • Part of subcall function 00A4B52D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A4B54D
                                                                  • Part of subcall function 00A4B52D: GetCurrentThreadId.KERNEL32 ref: 00A4B554
                                                                  • Part of subcall function 00A4B52D: AttachThreadInput.USER32(00000000,?,00A4A23B,?,00000001), ref: 00A4B55B
                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A4A246
                                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00A4A263
                                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00A4A266
                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A4A26F
                                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00A4A28D
                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00A4A290
                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00A4A299
                                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00A4A2B0
                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00A4A2B3
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                • String ID:
                                                                • API String ID: 2014098862-0
                                                                • Opcode ID: a5c846ac27f00b800869de03116be09f10f1ab0c971a8ce59e8b396426139d5a
                                                                • Instruction ID: 51f7cc8ff69efde673e674a65e87ad768ad323ce6d3dc654b3e933bae17137aa
                                                                • Opcode Fuzzy Hash: a5c846ac27f00b800869de03116be09f10f1ab0c971a8ce59e8b396426139d5a
                                                                • Instruction Fuzzy Hash: FC11E1B5950218BEF610AFA09C8AF6A7F2DEB8C760F100419F3406B0E0CAF35C519BB0
                                                                APIs
                                                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00A4915A,00000B00,?,?), ref: 00A494E2
                                                                • HeapAlloc.KERNEL32(00000000,?,00A4915A,00000B00,?,?), ref: 00A494E9
                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A4915A,00000B00,?,?), ref: 00A494FE
                                                                • GetCurrentProcess.KERNEL32(?,00000000,?,00A4915A,00000B00,?,?), ref: 00A49506
                                                                • DuplicateHandle.KERNEL32(00000000,?,00A4915A,00000B00,?,?), ref: 00A49509
                                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00A4915A,00000B00,?,?), ref: 00A49519
                                                                • GetCurrentProcess.KERNEL32(00A4915A,00000000,?,00A4915A,00000B00,?,?), ref: 00A49521
                                                                • DuplicateHandle.KERNEL32(00000000,?,00A4915A,00000B00,?,?), ref: 00A49524
                                                                • CreateThread.KERNEL32(00000000,00000000,00A4954A,00000000,00000000,00000000), ref: 00A4953E
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                • String ID:
                                                                • API String ID: 1957940570-0
                                                                • Opcode ID: c402a30f58a76c55381b13bdb0fdce1c357be06a208f8ba301d522f92db9b22f
                                                                • Instruction ID: 70be66b387cdbf5f304305da2635807d08f2a4c66dcab11ea48e70c95842fe19
                                                                • Opcode Fuzzy Hash: c402a30f58a76c55381b13bdb0fdce1c357be06a208f8ba301d522f92db9b22f
                                                                • Instruction Fuzzy Hash: F301CDB6240304BFE750EFA5DC8DF6B7BACEB89711F104511FA05DB1A1DA709805CB20
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: NULL Pointer assignment$Not an Object type
                                                                • API String ID: 0-572801152
                                                                • Opcode ID: 23d7b57ca736ca731dbb62182b74b85e225b24cb6fbd78c1fec4a702e736be82
                                                                • Instruction ID: 04e7684c4be3f085645057fa6fcb0de7a0048421e2240695617e8c96b5387a91
                                                                • Opcode Fuzzy Hash: 23d7b57ca736ca731dbb62182b74b85e225b24cb6fbd78c1fec4a702e736be82
                                                                • Instruction Fuzzy Hash: 40C18EB1A0021A9FDF10DFA8C984AAEB7B5FF58310F148469E916BB280E770DD45CF91
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearInit$_memset
                                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                • API String ID: 2862541840-625585964
                                                                • Opcode ID: 2245fe6d3ac4837a845847dbe54b6b8de6f3f58f2cade6616b38a099902a886d
                                                                • Instruction ID: 67bac002800114488b5a4e6ffc9886e76e3571b1be40458510d5c93bd9244a65
                                                                • Opcode Fuzzy Hash: 2245fe6d3ac4837a845847dbe54b6b8de6f3f58f2cade6616b38a099902a886d
                                                                • Instruction Fuzzy Hash: 44917A71A00219ABDF24CFA5C888FAFBBB8EF85710F10855EF515AB291D7709945CBA0
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00A77449
                                                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 00A7745D
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A77477
                                                                • _wcscat.LIBCMT ref: 00A774D2
                                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 00A774E9
                                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00A77517
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window_wcscat
                                                                • String ID: SysListView32
                                                                • API String ID: 307300125-78025650
                                                                • Opcode ID: 573cba7f816f576603f4c20b9508909098571f697004d4801e2cc59b523c59d6
                                                                • Instruction ID: d1236757de318fb1ebdab7f1d9de605a921ccc61be1b4309f1c7872be2040ca5
                                                                • Opcode Fuzzy Hash: 573cba7f816f576603f4c20b9508909098571f697004d4801e2cc59b523c59d6
                                                                • Instruction Fuzzy Hash: 7C41A271A04308AFEB21DFA4CC85FEE7BA8EF08350F10846AF949A7191D7719D95CB50
                                                                APIs
                                                                  • Part of subcall function 00A54148: CreateToolhelp32Snapshot.KERNEL32 ref: 00A5416D
                                                                  • Part of subcall function 00A54148: Process32FirstW.KERNEL32(00000000,?), ref: 00A5417B
                                                                  • Part of subcall function 00A54148: CloseHandle.KERNEL32(00000000), ref: 00A54245
                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A6F08D
                                                                • GetLastError.KERNEL32 ref: 00A6F0A0
                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A6F0CF
                                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00A6F14C
                                                                • GetLastError.KERNEL32(00000000), ref: 00A6F157
                                                                • CloseHandle.KERNEL32(00000000), ref: 00A6F18C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                • String ID: SeDebugPrivilege
                                                                • API String ID: 2533919879-2896544425
                                                                • Opcode ID: e63cf4c0408c0fd224e47df932c1270ad08e58b00c48f439832f3d56f90c79aa
                                                                • Instruction ID: 56ef47753f996474097e0969be35cc6ee4d5f71f4ebb4d55c411906762d2b3db
                                                                • Opcode Fuzzy Hash: e63cf4c0408c0fd224e47df932c1270ad08e58b00c48f439832f3d56f90c79aa
                                                                • Instruction Fuzzy Hash: 5941ED312002019FDB21EF68DCA5F7EB7B1AF84714F048519FA469F2D2CB74A809CB85
                                                                APIs
                                                                • LoadIconW.USER32(00000000,00007F03), ref: 00A5357C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: IconLoad
                                                                • String ID: blank$info$question$stop$warning
                                                                • API String ID: 2457776203-404129466
                                                                • Opcode ID: 98274c697039a9c2186ad1d0158f0ef59de98a943fde92ea10caf67bba3b89b1
                                                                • Instruction ID: b315b6778923fbb82279826b91375b18c18dc04e269110cc7dd5500ffeda68e6
                                                                • Opcode Fuzzy Hash: 98274c697039a9c2186ad1d0158f0ef59de98a943fde92ea10caf67bba3b89b1
                                                                • Instruction Fuzzy Hash: 9511EB73648346BEAF005F54DC92DAA77ACFF463E1B60111AFE00561C2F7746F4446A0
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00A54802
                                                                • LoadStringW.USER32(00000000), ref: 00A54809
                                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00A5481F
                                                                • LoadStringW.USER32(00000000), ref: 00A54826
                                                                • _wprintf.LIBCMT ref: 00A5484C
                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A5486A
                                                                Strings
                                                                • %s (%d) : ==> %s: %s %s, xrefs: 00A54847
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                                • String ID: %s (%d) : ==> %s: %s %s
                                                                • API String ID: 3648134473-3128320259
                                                                • Opcode ID: 6b8e5fc1c45e0523d042760cc7c8c4f71640964afbd80513571e5cee4b72bd67
                                                                • Instruction ID: 4929728e76d08298d49c5639e4057eede23df0c93bf1b8a43b671afaa8609907
                                                                • Opcode Fuzzy Hash: 6b8e5fc1c45e0523d042760cc7c8c4f71640964afbd80513571e5cee4b72bd67
                                                                • Instruction Fuzzy Hash: 6B014FF29002087FE791EBE09D89EF6736CEB08301F4005A5BB49E2041EA749E898B75
                                                                APIs
                                                                  • Part of subcall function 009F29E2: GetWindowLongW.USER32(?,000000EB), ref: 009F29F3
                                                                • GetSystemMetrics.USER32(0000000F), ref: 00A7DB42
                                                                • GetSystemMetrics.USER32(0000000F), ref: 00A7DB62
                                                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00A7DD9D
                                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00A7DDBB
                                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00A7DDDC
                                                                • ShowWindow.USER32(00000003,00000000), ref: 00A7DDFB
                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00A7DE20
                                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00A7DE43
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                • String ID:
                                                                • API String ID: 1211466189-0
                                                                • Opcode ID: a1746ff4572f54850e4fd9caa9d34d491039e028c60f9d43c38788339bb84576
                                                                • Instruction ID: 6f3db0864b06b0c0bee40f4f80bfd5dd08860b44d5a8f60fc18d0de3263fd4c0
                                                                • Opcode Fuzzy Hash: a1746ff4572f54850e4fd9caa9d34d491039e028c60f9d43c38788339bb84576
                                                                • Instruction Fuzzy Hash: 8CB18831600219EFDF15CF69C985BAE7BB1FF44701F18C069EC48AE295E775A990CBA0
                                                                APIs
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                  • Part of subcall function 00A7147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A7040D,?,?), ref: 00A71491
                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A7044E
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharConnectRegistryUpper_memmove
                                                                • String ID:
                                                                • API String ID: 3479070676-0
                                                                • Opcode ID: 35d904dccf92fde925c1a9e5c987f887355e429442418c8eeb204d5b90b3b178
                                                                • Instruction ID: f2fb0307f8e797ca969645b68abb47879bc58120e00eaf9dadcf027da9a9f465
                                                                • Opcode Fuzzy Hash: 35d904dccf92fde925c1a9e5c987f887355e429442418c8eeb204d5b90b3b178
                                                                • Instruction Fuzzy Hash: 80A14370204205DFCB11EF68C891F6EBBE5AF84314F14C91DF99A9B2A2DB71E945CB42
                                                                APIs
                                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A2C508,00000004,00000000,00000000,00000000), ref: 009F2E9F
                                                                • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00A2C508,00000004,00000000,00000000,00000000,000000FF), ref: 009F2EE7
                                                                • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00A2C508,00000004,00000000,00000000,00000000), ref: 00A2C55B
                                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A2C508,00000004,00000000,00000000,00000000), ref: 00A2C5C7
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ShowWindow
                                                                • String ID:
                                                                • API String ID: 1268545403-0
                                                                • Opcode ID: 51d97e0e068aeaee58f0b49eb18b64a58b4d54ce46b982acdafc0dc750a55fd8
                                                                • Instruction ID: adf5fe2043eb6e8e7eb1d9ba7b29be1f735de5a32c4907e0f458790d113a6b90
                                                                • Opcode Fuzzy Hash: 51d97e0e068aeaee58f0b49eb18b64a58b4d54ce46b982acdafc0dc750a55fd8
                                                                • Instruction Fuzzy Hash: CD4128306086889AC7758B2CDC88B7F7B96BB95310F34882DE687465A1C775F885DB21
                                                                APIs
                                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 00A57698
                                                                  • Part of subcall function 00A10FE6: std::exception::exception.LIBCMT ref: 00A1101C
                                                                  • Part of subcall function 00A10FE6: __CxxThrowException@8.LIBCMT ref: 00A11031
                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00A576CF
                                                                • EnterCriticalSection.KERNEL32(?), ref: 00A576EB
                                                                • _memmove.LIBCMT ref: 00A57739
                                                                • _memmove.LIBCMT ref: 00A57756
                                                                • LeaveCriticalSection.KERNEL32(?), ref: 00A57765
                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00A5777A
                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A57799
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                • String ID:
                                                                • API String ID: 256516436-0
                                                                • Opcode ID: 14d7b7357c334e95df4be18ef0df74a727744dc3a92566ab60980896d668277a
                                                                • Instruction ID: 1e1e866c6138209c74ab9b30535952d45ffdc047bb4cbbf57d2cac9f592c61bc
                                                                • Opcode Fuzzy Hash: 14d7b7357c334e95df4be18ef0df74a727744dc3a92566ab60980896d668277a
                                                                • Instruction Fuzzy Hash: 80319031904205EBCB50EFA4DD89EAEBBB8FF49310F1441A5FD04AB256D7709E55CBA0
                                                                APIs
                                                                • DeleteObject.GDI32(00000000), ref: 00A76810
                                                                • GetDC.USER32(00000000), ref: 00A76818
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A76823
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00A7682F
                                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00A7686B
                                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A7687C
                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00A7964F,?,?,000000FF,00000000,?,000000FF,?), ref: 00A768B6
                                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00A768D6
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                • String ID:
                                                                • API String ID: 3864802216-0
                                                                • Opcode ID: a0de1a31b3a431e55479feafa3d4eaa2dc2cb169f5dd87343661c47c643b10e7
                                                                • Instruction ID: a010a44bb98b93c4a7f0000a6d00aa274c0785624f43bdf4218d13bf53181cae
                                                                • Opcode Fuzzy Hash: a0de1a31b3a431e55479feafa3d4eaa2dc2cb169f5dd87343661c47c643b10e7
                                                                • Instruction Fuzzy Hash: B7318D721016107FEB108F50CC4AFAB3BADEF49761F048065FE089A291D7B59852CBB0
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memcmp
                                                                • String ID:
                                                                • API String ID: 2931989736-0
                                                                • Opcode ID: e1855b4a101eb55f55e9186289c194394caa8ead65925e13ee8a5d30973229d5
                                                                • Instruction ID: 683daa0d3f1a158396a0f941328c3b7379a6572c577c1d70a738b7aabbe73890
                                                                • Opcode Fuzzy Hash: e1855b4a101eb55f55e9186289c194394caa8ead65925e13ee8a5d30973229d5
                                                                • Instruction Fuzzy Hash: C421D7BBB022057BD64476118F82FAB376CAEA1BB4B044420FE0AA6242F711DE15C6A5
                                                                APIs
                                                                  • Part of subcall function 009F4D37: __itow.LIBCMT ref: 009F4D62
                                                                  • Part of subcall function 009F4D37: __swprintf.LIBCMT ref: 009F4DAC
                                                                  • Part of subcall function 00A0436A: _wcscpy.LIBCMT ref: 00A0438D
                                                                • _wcstok.LIBCMT ref: 00A5F2D7
                                                                • _wcscpy.LIBCMT ref: 00A5F366
                                                                • _memset.LIBCMT ref: 00A5F399
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                • String ID: X
                                                                • API String ID: 774024439-3081909835
                                                                • Opcode ID: 0738d163b1f3555bdc8e70da087480a5fd051938ee4c8ad34765762709204125
                                                                • Instruction ID: 10a57277c52a73831d089683e2f31a2214c7decdf6598beaefed5e330e50a390
                                                                • Opcode Fuzzy Hash: 0738d163b1f3555bdc8e70da087480a5fd051938ee4c8ad34765762709204125
                                                                • Instruction Fuzzy Hash: E2C19C715043459FD714EF64D981AAFB7E4BF89350F00492DF9999B2A2EB30EC49CB82
                                                                APIs
                                                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00A672EB
                                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00A6730C
                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A6731F
                                                                • htons.WSOCK32(?,?,?,00000000,?), ref: 00A673D5
                                                                • inet_ntoa.WSOCK32(?), ref: 00A67392
                                                                  • Part of subcall function 00A4B4EA: _strlen.LIBCMT ref: 00A4B4F4
                                                                  • Part of subcall function 00A4B4EA: _memmove.LIBCMT ref: 00A4B516
                                                                • _strlen.LIBCMT ref: 00A6742F
                                                                • _memmove.LIBCMT ref: 00A67498
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                                • String ID:
                                                                • API String ID: 3619996494-0
                                                                • Opcode ID: aef31cb13c1f35c934a4eaa256eb19579002e60e497806b994e9f4e54aa88f86
                                                                • Instruction ID: 47099633d17ebf25c13f3d4c4f625201802c870b91d25a81a248d904a9a505a2
                                                                • Opcode Fuzzy Hash: aef31cb13c1f35c934a4eaa256eb19579002e60e497806b994e9f4e54aa88f86
                                                                • Instruction Fuzzy Hash: 3981CF71118204ABD310EB24DC9AFAFB7B8EF84718F144618FA569B2D2DB70ED45CB91
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e87e6e9c511ae59571720b93792a63ea2c6d81aabc92c7623cd9d5fe53d1f9f5
                                                                • Instruction ID: 5ed9167531400fd34145d51fb05918d345c47aee26bb5034bc0c4662cb5a7d64
                                                                • Opcode Fuzzy Hash: e87e6e9c511ae59571720b93792a63ea2c6d81aabc92c7623cd9d5fe53d1f9f5
                                                                • Instruction Fuzzy Hash: C3715C30900109EFCB04DF99CD89EBEBB79FF86354F248159FA15AA251C734AA51CBA0
                                                                APIs
                                                                • IsWindow.USER32(01026058), ref: 00A7BA5D
                                                                • IsWindowEnabled.USER32(01026058), ref: 00A7BA69
                                                                • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00A7BB4D
                                                                • SendMessageW.USER32(01026058,000000B0,?,?), ref: 00A7BB84
                                                                • IsDlgButtonChecked.USER32(?,?), ref: 00A7BBC1
                                                                • GetWindowLongW.USER32(01026058,000000EC), ref: 00A7BBE3
                                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00A7BBFB
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                • String ID:
                                                                • API String ID: 4072528602-0
                                                                • Opcode ID: 26c3760fe4484e95b2b488a2ab3595011adfa18f51eaa81daaae9bfe2174b2c0
                                                                • Instruction ID: a13b3adb7b2d867673e37639ee7da7bf3abf8d2cdbfb0003895b2ab6d787e943
                                                                • Opcode Fuzzy Hash: 26c3760fe4484e95b2b488a2ab3595011adfa18f51eaa81daaae9bfe2174b2c0
                                                                • Instruction Fuzzy Hash: 8D718AB4614204AFDB25EF94CC94FFABBB9EF89340F10C059E949972A1CB71AC51CB60
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A6FB31
                                                                • _memset.LIBCMT ref: 00A6FBFA
                                                                • ShellExecuteExW.SHELL32(?), ref: 00A6FC3F
                                                                  • Part of subcall function 009F4D37: __itow.LIBCMT ref: 009F4D62
                                                                  • Part of subcall function 009F4D37: __swprintf.LIBCMT ref: 009F4DAC
                                                                  • Part of subcall function 00A0436A: _wcscpy.LIBCMT ref: 00A0438D
                                                                • GetProcessId.KERNEL32(00000000), ref: 00A6FCB6
                                                                • CloseHandle.KERNEL32(00000000), ref: 00A6FCE5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                • String ID: @
                                                                • API String ID: 3522835683-2766056989
                                                                • Opcode ID: b85a76527ef7432d9b4c864823d3037469e5ba9092c933c242fde4222bb04a1e
                                                                • Instruction ID: 437b63085c633a3ff32638de6c5aff96d5f89b57b9ec1eec334bcc9116a28d12
                                                                • Opcode Fuzzy Hash: b85a76527ef7432d9b4c864823d3037469e5ba9092c933c242fde4222bb04a1e
                                                                • Instruction Fuzzy Hash: FC61AC75A00619DFCB14EFA4D591AAEBBF5FF48310F148469E916AB391CB30AD41CF90
                                                                APIs
                                                                • GetParent.USER32(?), ref: 00A5178B
                                                                • GetKeyboardState.USER32(?), ref: 00A517A0
                                                                • SetKeyboardState.USER32(?), ref: 00A51801
                                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 00A5182F
                                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 00A5184E
                                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00A51894
                                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00A518B7
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                • String ID:
                                                                • API String ID: 87235514-0
                                                                • Opcode ID: 94b0acdb8f4210f7b3cfde11698a6af7e92901a83044ce0cd41114ce64e45313
                                                                • Instruction ID: 10d7857f095d0772361b9ab789052acd15aba07d299bb9d18174a8549788c881
                                                                • Opcode Fuzzy Hash: 94b0acdb8f4210f7b3cfde11698a6af7e92901a83044ce0cd41114ce64e45313
                                                                • Instruction Fuzzy Hash: FA51D4A09047D53EFB368338CC55BB67EE97B06306F088589E9D5458C3D2B8AC9CDB50
                                                                APIs
                                                                • GetParent.USER32(00000000), ref: 00A515A4
                                                                • GetKeyboardState.USER32(?), ref: 00A515B9
                                                                • SetKeyboardState.USER32(?), ref: 00A5161A
                                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00A51646
                                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00A51663
                                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00A516A7
                                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00A516C8
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                • String ID:
                                                                • API String ID: 87235514-0
                                                                • Opcode ID: 58e52145e4819e36b386f1821ea826a50b643a6f0ae4c55554355cfd879d19e2
                                                                • Instruction ID: dc173ca9b9bd3b5b9debe94ac46419e9016704448d91d00c1463b1ebd979860d
                                                                • Opcode Fuzzy Hash: 58e52145e4819e36b386f1821ea826a50b643a6f0ae4c55554355cfd879d19e2
                                                                • Instruction Fuzzy Hash: A95104A06047D13DFB3283248C45BBABEA97B45302F0C8589F9D5468C3D6B4EC9CE750
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _wcsncpy$LocalTime
                                                                • String ID:
                                                                • API String ID: 2945705084-0
                                                                • Opcode ID: cc21a76a452c529090a3252ee176dcc1f9bade39ce84e7f2d9a6838e9629ccad
                                                                • Instruction ID: e41dfbf980baee7c8dfb34ff006ffd80e2c03f4bfcf37b86d2fed93c96389763
                                                                • Opcode Fuzzy Hash: cc21a76a452c529090a3252ee176dcc1f9bade39ce84e7f2d9a6838e9629ccad
                                                                • Instruction Fuzzy Hash: B8417F67C1061875CB51FBF4C946ACFB7B8AF04311F508856F909E3261E634E6A983A5
                                                                APIs
                                                                  • Part of subcall function 00A54BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A53B8A,?), ref: 00A54BE0
                                                                  • Part of subcall function 00A54BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A53B8A,?), ref: 00A54BF9
                                                                • lstrcmpiW.KERNEL32(?,?), ref: 00A53BAA
                                                                • _wcscmp.LIBCMT ref: 00A53BC6
                                                                • MoveFileW.KERNEL32(?,?), ref: 00A53BDE
                                                                • _wcscat.LIBCMT ref: 00A53C26
                                                                • SHFileOperationW.SHELL32(?), ref: 00A53C92
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                • String ID: \*.*
                                                                • API String ID: 1377345388-1173974218
                                                                • Opcode ID: 2ae3a300cf5775b0b6024a58b13d9bc55fc539000e14b29005c6727ec11f51c5
                                                                • Instruction ID: a280b884ece22d556d4646f4efdd0cb2dfcb169cb8d7509523b321be58fc897e
                                                                • Opcode Fuzzy Hash: 2ae3a300cf5775b0b6024a58b13d9bc55fc539000e14b29005c6727ec11f51c5
                                                                • Instruction Fuzzy Hash: 58416F7250C3449ACB52EB64D585ADBB7E8AF89381F40192EF88AC3191EB34D68CC752
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A778CF
                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A77976
                                                                • IsMenu.USER32(?), ref: 00A7798E
                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A779D6
                                                                • DrawMenuBar.USER32 ref: 00A779E9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Menu$Item$DrawInfoInsert_memset
                                                                • String ID: 0
                                                                • API String ID: 3866635326-4108050209
                                                                • Opcode ID: d237020d03470824369dae43b036cd3ffb6822d17bb6ba4f6c551a66540a41e3
                                                                • Instruction ID: 5d5d4aed9d742feb204c5ab424a761e84ec92c2db3dc76ebaf9ae005e473977f
                                                                • Opcode Fuzzy Hash: d237020d03470824369dae43b036cd3ffb6822d17bb6ba4f6c551a66540a41e3
                                                                • Instruction Fuzzy Hash: 58412675A05209EFDB50DF94DC84EAEBBB9FB09310F04C129EA5997250D770AD54CFA0
                                                                APIs
                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00A71631
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A7165B
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00A71712
                                                                  • Part of subcall function 00A71602: RegCloseKey.ADVAPI32(?), ref: 00A71678
                                                                  • Part of subcall function 00A71602: FreeLibrary.KERNEL32(?), ref: 00A716CA
                                                                  • Part of subcall function 00A71602: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00A716ED
                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A716B5
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                • String ID:
                                                                • API String ID: 395352322-0
                                                                • Opcode ID: 729c2d143fbea74dce89bbcf0575265eb6c999f74b6f31c70ca9fd1b768dd6f8
                                                                • Instruction ID: d3635226092d2206c2f7093f075054525d5b67d4385001bcdc23174834980319
                                                                • Opcode Fuzzy Hash: 729c2d143fbea74dce89bbcf0575265eb6c999f74b6f31c70ca9fd1b768dd6f8
                                                                • Instruction Fuzzy Hash: 86313CB1900109BFDB14DFD4DC89EFEB7BCEF08300F148169E906A2150EB749E499BA0
                                                                APIs
                                                                • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00A76911
                                                                • GetWindowLongW.USER32(01026058,000000F0), ref: 00A76944
                                                                • GetWindowLongW.USER32(01026058,000000F0), ref: 00A76979
                                                                • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00A769AB
                                                                • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00A769D5
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A769E6
                                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A76A00
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: LongWindow$MessageSend
                                                                • String ID:
                                                                • API String ID: 2178440468-0
                                                                • Opcode ID: ee33b3acf1eb6200a3389884c487c7b36e40db0fd70822f94ead29b5a0a8ca86
                                                                • Instruction ID: 2363957b2d33da70de4386134abe6090c95efed8d90f2fc3075f5fe5e3ffc157
                                                                • Opcode Fuzzy Hash: ee33b3acf1eb6200a3389884c487c7b36e40db0fd70822f94ead29b5a0a8ca86
                                                                • Instruction Fuzzy Hash: F9314630604551AFDB20CF98DC88F6937E1FB99310F1882A4F6088F2B2CBB1AC95CB50
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A4E2CA
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A4E2F0
                                                                • SysAllocString.OLEAUT32(00000000), ref: 00A4E2F3
                                                                • SysAllocString.OLEAUT32(?), ref: 00A4E311
                                                                • SysFreeString.OLEAUT32(?), ref: 00A4E31A
                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00A4E33F
                                                                • SysAllocString.OLEAUT32(?), ref: 00A4E34D
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                • String ID:
                                                                • API String ID: 3761583154-0
                                                                • Opcode ID: 7b4e5de7311bc8b1689ef502f45e2656a9e8b7f6efcb55609eed150bd650b12d
                                                                • Instruction ID: b0e46553e1b218479eb4bd8c022cdb95156c0650b4ec255560ed2474cef4d5b5
                                                                • Opcode Fuzzy Hash: 7b4e5de7311bc8b1689ef502f45e2656a9e8b7f6efcb55609eed150bd650b12d
                                                                • Instruction Fuzzy Hash: 4D21607A604219BF9F50DFA8DC88CBB77ACFF49360B448125FA14DB250D670AD868760
                                                                APIs
                                                                  • Part of subcall function 00A68475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A684A0
                                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00A668B1
                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A668C0
                                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00A668F9
                                                                • connect.WSOCK32(00000000,?,00000010), ref: 00A66902
                                                                • WSAGetLastError.WSOCK32 ref: 00A6690C
                                                                • closesocket.WSOCK32(00000000), ref: 00A66935
                                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00A6694E
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                • String ID:
                                                                • API String ID: 910771015-0
                                                                • Opcode ID: 5d3ffc02b86d2f06715e6ad1c883ca78c0ff9207c519b379db02dafae93b1a09
                                                                • Instruction ID: 25842487f8a30d4328d83c9dbedc61422d30c06dc4e3a3578bc1796d56316548
                                                                • Opcode Fuzzy Hash: 5d3ffc02b86d2f06715e6ad1c883ca78c0ff9207c519b379db02dafae93b1a09
                                                                • Instruction Fuzzy Hash: FB317F71600218AFDB10AF64CC85FBE7BB9EB44725F048129FE05AB291DB74AD458BA1
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A4E3A5
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A4E3CB
                                                                • SysAllocString.OLEAUT32(00000000), ref: 00A4E3CE
                                                                • SysAllocString.OLEAUT32 ref: 00A4E3EF
                                                                • SysFreeString.OLEAUT32 ref: 00A4E3F8
                                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00A4E412
                                                                • SysAllocString.OLEAUT32(?), ref: 00A4E420
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                • String ID:
                                                                • API String ID: 3761583154-0
                                                                • Opcode ID: c74647c790166bb822df16cc8c3326b051abd67712614eda239e05205e38f1d3
                                                                • Instruction ID: 3e0679a9a878076c1b609aa12a4c40bd191c06437bd142b62b99a7f6366507c6
                                                                • Opcode Fuzzy Hash: c74647c790166bb822df16cc8c3326b051abd67712614eda239e05205e38f1d3
                                                                • Instruction Fuzzy Hash: E1214439604208AFAB50DFA8DC89DAE77ECFF49360B008525FA15CB260D671EC858B64
                                                                APIs
                                                                  • Part of subcall function 009F2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009F214F
                                                                  • Part of subcall function 009F2111: GetStockObject.GDI32(00000011), ref: 009F2163
                                                                  • Part of subcall function 009F2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 009F216D
                                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00A77C57
                                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00A77C64
                                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00A77C6F
                                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00A77C7E
                                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00A77C8A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$CreateObjectStockWindow
                                                                • String ID: Msctls_Progress32
                                                                • API String ID: 1025951953-3636473452
                                                                • Opcode ID: 26d76a679ca85fbd549c6d6bbef55be108077ab1088e3d931323fedb641e2a18
                                                                • Instruction ID: f1faf0614d9f7159ef38a95352a0c49a4bfe105b4c9f459ffd555894fa7d8398
                                                                • Opcode Fuzzy Hash: 26d76a679ca85fbd549c6d6bbef55be108077ab1088e3d931323fedb641e2a18
                                                                • Instruction Fuzzy Hash: 7E1163B1154219BEEF159F60CC85EEB7F5DEF48798F018115BA08A6090CB729C21DBA4
                                                                APIs
                                                                • __init_pointers.LIBCMT ref: 00A19D16
                                                                  • Part of subcall function 00A133B7: EncodePointer.KERNEL32(00000000), ref: 00A133BA
                                                                  • Part of subcall function 00A133B7: __initp_misc_winsig.LIBCMT ref: 00A133D5
                                                                  • Part of subcall function 00A133B7: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00A1A0D0
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00A1A0E4
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00A1A0F7
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00A1A10A
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00A1A11D
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00A1A130
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00A1A143
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00A1A156
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00A1A169
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00A1A17C
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00A1A18F
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00A1A1A2
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00A1A1B5
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00A1A1C8
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00A1A1DB
                                                                  • Part of subcall function 00A133B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00A1A1EE
                                                                • __mtinitlocks.LIBCMT ref: 00A19D1B
                                                                • __mtterm.LIBCMT ref: 00A19D24
                                                                  • Part of subcall function 00A19D8C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00A19D29,00A17EFD,00AACD38,00000014), ref: 00A19E86
                                                                  • Part of subcall function 00A19D8C: _free.LIBCMT ref: 00A19E8D
                                                                  • Part of subcall function 00A19D8C: DeleteCriticalSection.KERNEL32(00AB0C00,?,?,00A19D29,00A17EFD,00AACD38,00000014), ref: 00A19EAF
                                                                • __calloc_crt.LIBCMT ref: 00A19D49
                                                                • __initptd.LIBCMT ref: 00A19D6B
                                                                • GetCurrentThreadId.KERNEL32 ref: 00A19D72
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                                • String ID:
                                                                • API String ID: 3567560977-0
                                                                • Opcode ID: b7c93f25a9de448d7bdaf5e3bb4fb091fdf38c930e4494b06468e3c96cbeaf02
                                                                • Instruction ID: 99ccd4d842d453659e2a845fe137824dea76470be11ad817023fb98d141a14e2
                                                                • Opcode Fuzzy Hash: b7c93f25a9de448d7bdaf5e3bb4fb091fdf38c930e4494b06468e3c96cbeaf02
                                                                • Instruction Fuzzy Hash: 4DF06D3290A7216AE6747BB47E236CB2694DF41770F210719F4A0D50E3EF10C8C28191
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00A14282,?), ref: 00A141D3
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00A141DA
                                                                • EncodePointer.KERNEL32(00000000), ref: 00A141E6
                                                                • DecodePointer.KERNEL32(00000001,00A14282,?), ref: 00A14203
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                • String ID: RoInitialize$combase.dll
                                                                • API String ID: 3489934621-340411864
                                                                • Opcode ID: 82692b45a2ad83bdcb3eed46fd94c47e73a7ce9865ee29f2d781fb2bfb481044
                                                                • Instruction ID: 190f794e2465d8a104bac39c334ed90c090fe71e1244442c40edfa008504d51a
                                                                • Opcode Fuzzy Hash: 82692b45a2ad83bdcb3eed46fd94c47e73a7ce9865ee29f2d781fb2bfb481044
                                                                • Instruction Fuzzy Hash: DDE0E571A90701BFEB90ABF8EC4DB483A64BB14B06F604B24F501E90F0DBB5449A8F00
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00A141A8), ref: 00A142A8
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00A142AF
                                                                • EncodePointer.KERNEL32(00000000), ref: 00A142BA
                                                                • DecodePointer.KERNEL32(00A141A8), ref: 00A142D5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                • String ID: RoUninitialize$combase.dll
                                                                • API String ID: 3489934621-2819208100
                                                                • Opcode ID: d732f8d263be35ef420cc388b29bf813a4608b571a6706ed7278a16e2da88596
                                                                • Instruction ID: b6a6344d62a576487871b90dad012f98b9312aced5832b689b32056ff0c40484
                                                                • Opcode Fuzzy Hash: d732f8d263be35ef420cc388b29bf813a4608b571a6706ed7278a16e2da88596
                                                                • Instruction Fuzzy Hash: 68E09271950B00ABEB91EBF9BD0DF843A68BB04B42F504B14F101E91B1CBB4458A8B10
                                                                APIs
                                                                • GetClientRect.USER32(?,?), ref: 009F21B8
                                                                • GetWindowRect.USER32(?,?), ref: 009F21F9
                                                                • ScreenToClient.USER32(?,?), ref: 009F2221
                                                                • GetClientRect.USER32(?,?), ref: 009F2350
                                                                • GetWindowRect.USER32(?,?), ref: 009F2369
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Rect$Client$Window$Screen
                                                                • String ID:
                                                                • API String ID: 1296646539-0
                                                                • Opcode ID: c2349a298f8ca0176e3fa088d67c3d0e7cd02c5e8231f4f5b9b9d40b204fbe6f
                                                                • Instruction ID: c461aa608d03654ed5be28cfdd3709be0a42fba3b72f753a0e19259c504c3ce6
                                                                • Opcode Fuzzy Hash: c2349a298f8ca0176e3fa088d67c3d0e7cd02c5e8231f4f5b9b9d40b204fbe6f
                                                                • Instruction Fuzzy Hash: E7B18C79A10249DBCF14CFA8C5807EDB7B1FF08710F148529EE59AB254EB74AA40CB64
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memmove$__itow__swprintf
                                                                • String ID:
                                                                • API String ID: 3253778849-0
                                                                • Opcode ID: 688e6c6c124e9ae0a8ba251e21ed6ba9a33d7dbe6b3c421d6bca86e0985a3d28
                                                                • Instruction ID: 977ebf35d2f7c54cfe99726aa2f32f324785b89878e78833fc08fd601c8ef43e
                                                                • Opcode Fuzzy Hash: 688e6c6c124e9ae0a8ba251e21ed6ba9a33d7dbe6b3c421d6bca86e0985a3d28
                                                                • Instruction Fuzzy Hash: EB61AD3050029AABCF11EF60CD82EFE37A8BF49309F454559FE996B192DB34AD49CB50
                                                                APIs
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                  • Part of subcall function 00A7147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A7040D,?,?), ref: 00A71491
                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A7091D
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A7095D
                                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00A70980
                                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00A709A9
                                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A709EC
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00A709F9
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                • String ID:
                                                                • API String ID: 4046560759-0
                                                                • Opcode ID: f2b1be2354b3099d2902afa7eb57e13d95a4b58802f557bf43d336f90687360a
                                                                • Instruction ID: 37038610ccfc855b072b23d7f23c4a7598e94274c3edaf5401c5508b2cf7fb4c
                                                                • Opcode Fuzzy Hash: f2b1be2354b3099d2902afa7eb57e13d95a4b58802f557bf43d336f90687360a
                                                                • Instruction Fuzzy Hash: F5514871208244AFD714EB64CD85EABBBF9FF88314F04891DF589872A2DB31E905CB52
                                                                APIs
                                                                • GetMenu.USER32(?), ref: 00A75E38
                                                                • GetMenuItemCount.USER32(00000000), ref: 00A75E6F
                                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00A75E97
                                                                • GetMenuItemID.USER32(?,?), ref: 00A75F06
                                                                • GetSubMenu.USER32(?,?), ref: 00A75F14
                                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 00A75F65
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Menu$Item$CountMessagePostString
                                                                • String ID:
                                                                • API String ID: 650687236-0
                                                                • Opcode ID: 2c84fc7835980aeb41d7124fd0bb9056e08342e41e213cf68c3ea5e85107ae1d
                                                                • Instruction ID: 2f6e7a902ec853099204c69e84523aa0c69b70599e95e283139e399ac50bb19a
                                                                • Opcode Fuzzy Hash: 2c84fc7835980aeb41d7124fd0bb9056e08342e41e213cf68c3ea5e85107ae1d
                                                                • Instruction Fuzzy Hash: 1051AF35E00619AFCF11EFA4CD41AAEB7B5EF48310F118069F905BB391CB70AE418B90
                                                                APIs
                                                                • VariantInit.OLEAUT32(?), ref: 00A4F6A2
                                                                • VariantClear.OLEAUT32(00000013), ref: 00A4F714
                                                                • VariantClear.OLEAUT32(00000000), ref: 00A4F76F
                                                                • _memmove.LIBCMT ref: 00A4F799
                                                                • VariantClear.OLEAUT32(?), ref: 00A4F7E6
                                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A4F814
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Variant$Clear$ChangeInitType_memmove
                                                                • String ID:
                                                                • API String ID: 1101466143-0
                                                                • Opcode ID: 0cb205126e23bb191b03fefdefb242534ec83441f1d2bb082c05beb44c15fa33
                                                                • Instruction ID: fd7d17957f3e2c04354899a4202f2588f1fe8cea797eb9cace72e8f5a1a164f3
                                                                • Opcode Fuzzy Hash: 0cb205126e23bb191b03fefdefb242534ec83441f1d2bb082c05beb44c15fa33
                                                                • Instruction Fuzzy Hash: 05512D79A00209EFDB14CF58C884AAAB7B8FF8C354B15856AE959DB304D734E951CF90
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A529FF
                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A52A4A
                                                                • IsMenu.USER32(00000000), ref: 00A52A6A
                                                                • CreatePopupMenu.USER32 ref: 00A52A9E
                                                                • GetMenuItemCount.USER32(000000FF), ref: 00A52AFC
                                                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00A52B2D
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                • String ID:
                                                                • API String ID: 3311875123-0
                                                                • Opcode ID: 75999cce8f38dc0a74d400bc0c138571fb7a8c1bc699956861b0f4c16d43d683
                                                                • Instruction ID: c95a60cd7dc91bb3fb6b74ec9519226824892ae6dad4c311a891fcd4b48b279d
                                                                • Opcode Fuzzy Hash: 75999cce8f38dc0a74d400bc0c138571fb7a8c1bc699956861b0f4c16d43d683
                                                                • Instruction Fuzzy Hash: F151BD70A0020ADFDF25CF68C888BAEBBF5BF56315F104119EC119B2A1E7B09E49CB51
                                                                APIs
                                                                  • Part of subcall function 009F29E2: GetWindowLongW.USER32(?,000000EB), ref: 009F29F3
                                                                • BeginPaint.USER32(?,?,?,?,?,?), ref: 009F1B76
                                                                • GetWindowRect.USER32(?,?), ref: 009F1BDA
                                                                • ScreenToClient.USER32(?,?), ref: 009F1BF7
                                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 009F1C08
                                                                • EndPaint.USER32(?,?), ref: 009F1C52
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                • String ID:
                                                                • API String ID: 1827037458-0
                                                                • Opcode ID: cbc2e1fe0137d2999f546dc3c7d2b5070f50baa4b4599227f81507314d9eff31
                                                                • Instruction ID: fefffe1eb99ee2a6571eb1665e14fad56194cae0f2c541b57ccf96cfaf973fb0
                                                                • Opcode Fuzzy Hash: cbc2e1fe0137d2999f546dc3c7d2b5070f50baa4b4599227f81507314d9eff31
                                                                • Instruction Fuzzy Hash: 4D41D230104304EFD711DF64DC88FBA7BE8EB95360F140669FA99872B2C7719846DBA1
                                                                APIs
                                                                • ShowWindow.USER32(00AB77B0,00000000,01026058,?,?,00AB77B0,?,00A7BC1A,?,?), ref: 00A7BD84
                                                                • EnableWindow.USER32(?,00000000), ref: 00A7BDA8
                                                                • ShowWindow.USER32(00AB77B0,00000000,01026058,?,?,00AB77B0,?,00A7BC1A,?,?), ref: 00A7BE08
                                                                • ShowWindow.USER32(?,00000004,?,00A7BC1A,?,?), ref: 00A7BE1A
                                                                • EnableWindow.USER32(?,00000001), ref: 00A7BE3E
                                                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00A7BE61
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$Show$Enable$MessageSend
                                                                • String ID:
                                                                • API String ID: 642888154-0
                                                                • Opcode ID: e66395d29f21b6d3fc006005fff71984709ecd50af3b157456241db77007029b
                                                                • Instruction ID: 0cdcaefa65ff2b0b8d9e8d396f9389f49950c958ab8dc186dcca5822ffc2a46e
                                                                • Opcode Fuzzy Hash: e66395d29f21b6d3fc006005fff71984709ecd50af3b157456241db77007029b
                                                                • Instruction Fuzzy Hash: 45413B74610144AFDB22CF68C889BD57BE1BF09314F18C1A9FA4C8F2A2C771AC56CB61
                                                                APIs
                                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,00A6550C,?,?,00000000,00000001), ref: 00A67796
                                                                  • Part of subcall function 00A6406C: GetWindowRect.USER32(?,?), ref: 00A6407F
                                                                • GetDesktopWindow.USER32 ref: 00A677C0
                                                                • GetWindowRect.USER32(00000000), ref: 00A677C7
                                                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00A677F9
                                                                  • Part of subcall function 00A557FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A55877
                                                                • GetCursorPos.USER32(?), ref: 00A67825
                                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00A67883
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                • String ID:
                                                                • API String ID: 4137160315-0
                                                                • Opcode ID: 619c896c6d70f0658bce01ddd94f4cee6b0c5d929122d19718cfa26a0ada6b2d
                                                                • Instruction ID: 164842f90073475bdca333b2571273b9c086647f65776a14270afabec509abd0
                                                                • Opcode Fuzzy Hash: 619c896c6d70f0658bce01ddd94f4cee6b0c5d929122d19718cfa26a0ada6b2d
                                                                • Instruction Fuzzy Hash: DB31B072508305ABD720DF64D849F9FB7A9FF88314F000929F599A7191DB70ED49CBA2
                                                                APIs
                                                                  • Part of subcall function 00A48CC7: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A48CDE
                                                                  • Part of subcall function 00A48CC7: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A48CE8
                                                                  • Part of subcall function 00A48CC7: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A48CF7
                                                                  • Part of subcall function 00A48CC7: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A48CFE
                                                                  • Part of subcall function 00A48CC7: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A48D14
                                                                • GetLengthSid.ADVAPI32(?,00000000,00A4904D), ref: 00A49482
                                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A4948E
                                                                • HeapAlloc.KERNEL32(00000000), ref: 00A49495
                                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A494AE
                                                                • GetProcessHeap.KERNEL32(00000000,00000000,00A4904D), ref: 00A494C2
                                                                • HeapFree.KERNEL32(00000000), ref: 00A494C9
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                • String ID:
                                                                • API String ID: 3008561057-0
                                                                • Opcode ID: 122726d466011b7fe9f30f7cf1d1037857e3d02263e240b172d01f51de1e2d3f
                                                                • Instruction ID: 54499977dbd6fe6bec84517d74379a584acb5780ba6a586cfeb4130e79ebebb7
                                                                • Opcode Fuzzy Hash: 122726d466011b7fe9f30f7cf1d1037857e3d02263e240b172d01f51de1e2d3f
                                                                • Instruction Fuzzy Hash: 8D11A936601604EFDB50DFA4CC49FAFBBB9FB85326F108158E84697250C73AA916CB60
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A49200
                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00A49207
                                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A49216
                                                                • CloseHandle.KERNEL32(00000004), ref: 00A49221
                                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A49250
                                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A49264
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                • String ID:
                                                                • API String ID: 1413079979-0
                                                                • Opcode ID: 0ea7ff5f6f8589c258c23d96b1cc7bfe5a52893173df48764da6ce3cf5a39400
                                                                • Instruction ID: 605fcd1095c6915c10a13654131da3088c7c578aea5dc83835218cce517873fe
                                                                • Opcode Fuzzy Hash: 0ea7ff5f6f8589c258c23d96b1cc7bfe5a52893173df48764da6ce3cf5a39400
                                                                • Instruction Fuzzy Hash: 8211447650120AABDF41CFE8ED49FDB7BA9EF88304F044124FA04A2160C2729E65EB60
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 00A4C34E
                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00A4C35F
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A4C366
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 00A4C36E
                                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00A4C385
                                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 00A4C397
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CapsDevice$Release
                                                                • String ID:
                                                                • API String ID: 1035833867-0
                                                                • Opcode ID: f6098253693208e76202a681fefc8ead7d26658118baf2e635428eafd5630a92
                                                                • Instruction ID: 8a80d2cb3743b53c93b8732840aa28dada24454752ee048eb93cc2b1794b691a
                                                                • Opcode Fuzzy Hash: f6098253693208e76202a681fefc8ead7d26658118baf2e635428eafd5630a92
                                                                • Instruction Fuzzy Hash: 25012175E01218BBEB509BE59D49E5EBFB8EF88761F004065FA08AB290D6709915CFA0
                                                                APIs
                                                                  • Part of subcall function 009F16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009F1729
                                                                  • Part of subcall function 009F16CF: SelectObject.GDI32(?,00000000), ref: 009F1738
                                                                  • Part of subcall function 009F16CF: BeginPath.GDI32(?), ref: 009F174F
                                                                  • Part of subcall function 009F16CF: SelectObject.GDI32(?,00000000), ref: 009F1778
                                                                • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00A7C57C
                                                                • LineTo.GDI32(00000000,00000003,?), ref: 00A7C590
                                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00A7C59E
                                                                • LineTo.GDI32(00000000,00000000,?), ref: 00A7C5AE
                                                                • EndPath.GDI32(00000000), ref: 00A7C5BE
                                                                • StrokePath.GDI32(00000000), ref: 00A7C5CE
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                • String ID:
                                                                • API String ID: 43455801-0
                                                                • Opcode ID: 10267a4c6182254f67e39ca97dfc1fca601f9665f8488b9fbba7cd8286050fb9
                                                                • Instruction ID: 5697fab632c9cb79fffe64509635d58e805164429c96ba1f9bfe77d13e585998
                                                                • Opcode Fuzzy Hash: 10267a4c6182254f67e39ca97dfc1fca601f9665f8488b9fbba7cd8286050fb9
                                                                • Instruction Fuzzy Hash: CA110C7204010DBFDB129F90DC88FAA7F6DEF04364F048155BA185A1A1C771AD59DBA0
                                                                APIs
                                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A107EC
                                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00A107F4
                                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A107FF
                                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A1080A
                                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00A10812
                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A1081A
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Virtual
                                                                • String ID:
                                                                • API String ID: 4278518827-0
                                                                • Opcode ID: 2f283a9c96f7cce34acf41a3a3afa2e24890953b56b2d1d767d17f1c6b01a7b3
                                                                • Instruction ID: 9fe1ed234991cfc2d3486a4a4850af1fcea8ce191eb2d528518d2ba132414f5e
                                                                • Opcode Fuzzy Hash: 2f283a9c96f7cce34acf41a3a3afa2e24890953b56b2d1d767d17f1c6b01a7b3
                                                                • Instruction Fuzzy Hash: F0016CB09017597DE3008F5A8C85B53FFA8FF59354F00411BA15C47941C7F5A868CBE5
                                                                APIs
                                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00A559B4
                                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00A559CA
                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 00A559D9
                                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A559E8
                                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A559F2
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A559F9
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                • String ID:
                                                                • API String ID: 839392675-0
                                                                • Opcode ID: 5fcf0532c0bbb2f6cf43b48534513597ecc8ae83c85c66d41ba2ad48b5eb4dbe
                                                                • Instruction ID: 373b6b249552c8884cbb2cce30bb4c1a2075151aee552910cc90f8edcbde1855
                                                                • Opcode Fuzzy Hash: 5fcf0532c0bbb2f6cf43b48534513597ecc8ae83c85c66d41ba2ad48b5eb4dbe
                                                                • Instruction Fuzzy Hash: 0AF01D32641158BBE7619BD29C0DEEF7A7CEFC6B21F000269FA0591050E7A41A1687B5
                                                                APIs
                                                                • InterlockedExchange.KERNEL32(?,?), ref: 00A577FE
                                                                • EnterCriticalSection.KERNEL32(?,?,009FC2B6,?,?), ref: 00A5780F
                                                                • TerminateThread.KERNEL32(00000000,000001F6,?,009FC2B6,?,?), ref: 00A5781C
                                                                • WaitForSingleObject.KERNEL32(00000000,000003E8,?,009FC2B6,?,?), ref: 00A57829
                                                                  • Part of subcall function 00A571F0: CloseHandle.KERNEL32(00000000,?,00A57836,?,009FC2B6,?,?), ref: 00A571FA
                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A5783C
                                                                • LeaveCriticalSection.KERNEL32(?,?,009FC2B6,?,?), ref: 00A57843
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                • String ID:
                                                                • API String ID: 3495660284-0
                                                                • Opcode ID: d9b15752b0d3a9ceb8e2720cdc9a90e1e4135ad6438a3cf38e44beac426518a9
                                                                • Instruction ID: 1157945ad8838de377ad2e8e2b8122a309488aeeefb1ea861917e82ad8deece1
                                                                • Opcode Fuzzy Hash: d9b15752b0d3a9ceb8e2720cdc9a90e1e4135ad6438a3cf38e44beac426518a9
                                                                • Instruction Fuzzy Hash: 3EF08C32145612ABD7916BA4FC8CEEF7B3AFF49312F140521F603A50A0EBF5580ACB60
                                                                APIs
                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A49555
                                                                • UnloadUserProfile.USERENV(?,?), ref: 00A49561
                                                                • CloseHandle.KERNEL32(?), ref: 00A4956A
                                                                • CloseHandle.KERNEL32(?), ref: 00A49572
                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00A4957B
                                                                • HeapFree.KERNEL32(00000000), ref: 00A49582
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                • String ID:
                                                                • API String ID: 146765662-0
                                                                • Opcode ID: 45d92a416169efe6a1d45c9fadf519d9bd42d43fef1774d22c39d5f69217374c
                                                                • Instruction ID: 6a34c44f2f78932d87ddd889d955999ff1ff891586e8dfca1dbd510502791623
                                                                • Opcode Fuzzy Hash: 45d92a416169efe6a1d45c9fadf519d9bd42d43fef1774d22c39d5f69217374c
                                                                • Instruction Fuzzy Hash: 55E0E536004601BBDB819FE1EC0CD5ABF39FF49722B104220F225C5074CB32A46ADB50
                                                                APIs
                                                                • VariantInit.OLEAUT32(?), ref: 00A68CFD
                                                                • CharUpperBuffW.USER32(?,?), ref: 00A68E0C
                                                                • VariantClear.OLEAUT32(?), ref: 00A68F84
                                                                  • Part of subcall function 00A57B1D: VariantInit.OLEAUT32(00000000), ref: 00A57B5D
                                                                  • Part of subcall function 00A57B1D: VariantCopy.OLEAUT32(00000000,?), ref: 00A57B66
                                                                  • Part of subcall function 00A57B1D: VariantClear.OLEAUT32(00000000), ref: 00A57B72
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                • API String ID: 4237274167-1221869570
                                                                • Opcode ID: f46919bb6d5eb2c15e941c84b6fc254447944bf135159f6e4ecbc3ecd9d2dc0a
                                                                • Instruction ID: 582c3e23eed4256b5612909c51e647181b154314eb91ec3bbb8984dba124247b
                                                                • Opcode Fuzzy Hash: f46919bb6d5eb2c15e941c84b6fc254447944bf135159f6e4ecbc3ecd9d2dc0a
                                                                • Instruction Fuzzy Hash: B6917C706083059FC710DF24C58096ABBF9EFD9354F148A6EF98A8B3A1DB31E905CB52
                                                                APIs
                                                                  • Part of subcall function 00A0436A: _wcscpy.LIBCMT ref: 00A0438D
                                                                • _memset.LIBCMT ref: 00A5332E
                                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A5335D
                                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A53410
                                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00A5343E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                • String ID: 0
                                                                • API String ID: 4152858687-4108050209
                                                                • Opcode ID: 23423c59a42c8e3713eadd1204e71a50e431935cc86d64b16c1676ebbfc54769
                                                                • Instruction ID: 56761848f24ea986a8f44177e6a1b63ada2e78a87211f57647e22538fb4cc78f
                                                                • Opcode Fuzzy Hash: 23423c59a42c8e3713eadd1204e71a50e431935cc86d64b16c1676ebbfc54769
                                                                • Instruction Fuzzy Hash: B551D132608300ABDB169F68D9456AFB7E8BFD53A2F044A2DFC91971D1DB70CA48C752
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A52F67
                                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00A52F83
                                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 00A52FC9
                                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00AB7890,00000000), ref: 00A53012
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Menu$Delete$InfoItem_memset
                                                                • String ID: 0
                                                                • API String ID: 1173514356-4108050209
                                                                • Opcode ID: fb84f4061464d71cf068e744405af8efba3b3e20a2d922a82e41ebafbea4bf6d
                                                                • Instruction ID: a808a16362bec939c95a3e0aa480533e878e7ec5d850c55ba6ee3940dca96398
                                                                • Opcode Fuzzy Hash: fb84f4061464d71cf068e744405af8efba3b3e20a2d922a82e41ebafbea4bf6d
                                                                • Instruction Fuzzy Hash: C641B2322043419FDB24DF24D885B5ABBE4BF85351F10461DF965972D1D770EA09CB62
                                                                APIs
                                                                • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00A6DEAE
                                                                  • Part of subcall function 00A01462: _memmove.LIBCMT ref: 00A014B0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharLower_memmove
                                                                • String ID: cdecl$none$stdcall$winapi
                                                                • API String ID: 3425801089-567219261
                                                                • Opcode ID: c1ac14d6c27f652f9676ed9686c4c319c4013a07b3b0cb5de94f44872e98e4f1
                                                                • Instruction ID: 8a4e3a8af25714a1e8f869980c5bbbb164ae1386c6bc5107903327cfa164962c
                                                                • Opcode Fuzzy Hash: c1ac14d6c27f652f9676ed9686c4c319c4013a07b3b0cb5de94f44872e98e4f1
                                                                • Instruction Fuzzy Hash: B931A270A00219AFCF10EF94DE819EEB3B4FF55354B108A29F866972D1DB71A945CB80
                                                                APIs
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                  • Part of subcall function 00A4B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B7BD
                                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00A49ACC
                                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00A49ADF
                                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00A49B0F
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$_memmove$ClassName
                                                                • String ID: ComboBox$ListBox
                                                                • API String ID: 365058703-1403004172
                                                                • Opcode ID: 409a92112720a0dea7102c44a528da3330a34956725ce5e1e7971d3138f28cb8
                                                                • Instruction ID: 9bb5f6b12f8070788e616f9a5b22204b53c5280b213afb54b3291223fe603c1f
                                                                • Opcode Fuzzy Hash: 409a92112720a0dea7102c44a528da3330a34956725ce5e1e7971d3138f28cb8
                                                                • Instruction Fuzzy Hash: 7F210575A01108BEDB24EBA4ED8ACFFB7BCDF95360F104119F825972D1DB34496A9620
                                                                APIs
                                                                  • Part of subcall function 009F2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009F214F
                                                                  • Part of subcall function 009F2111: GetStockObject.GDI32(00000011), ref: 009F2163
                                                                  • Part of subcall function 009F2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 009F216D
                                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00A76A86
                                                                • LoadLibraryW.KERNEL32(?), ref: 00A76A8D
                                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00A76AA2
                                                                • DestroyWindow.USER32(?), ref: 00A76AAA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                • String ID: SysAnimate32
                                                                • API String ID: 4146253029-1011021900
                                                                • Opcode ID: fa7e54c66a6b7802bbdb2e7f9be32b44cdc08f5969281fe00b6c4dc78fb34442
                                                                • Instruction ID: 8e2f11cf72f65f56bdfc00d687067adb67f9c943133a302e8e2c9224eb6586df
                                                                • Opcode Fuzzy Hash: fa7e54c66a6b7802bbdb2e7f9be32b44cdc08f5969281fe00b6c4dc78fb34442
                                                                • Instruction Fuzzy Hash: 25218871200A05AFEF108FA49C80FBB77BDEB593A4F50C629FA58A2190D3719C919B60
                                                                APIs
                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00A57377
                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A573AA
                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00A573BC
                                                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00A573F6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CreateHandle$FilePipe
                                                                • String ID: nul
                                                                • API String ID: 4209266947-2873401336
                                                                • Opcode ID: ba2c802dcea59f3cd3ca6543adc9645d414e2aed3a5a413a3dc6c42694ec6ed5
                                                                • Instruction ID: 34145f381d8736a1068d4c57058bd99ec6c1e6888b78f6d23180ca7486d9031c
                                                                • Opcode Fuzzy Hash: ba2c802dcea59f3cd3ca6543adc9645d414e2aed3a5a413a3dc6c42694ec6ed5
                                                                • Instruction Fuzzy Hash: 40219174504206ABDB208F65EC08A9E7BA4BF54731F204A19FCA0EB2D0E770D859DB50
                                                                APIs
                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00A57444
                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A57476
                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00A57487
                                                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00A574C1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CreateHandle$FilePipe
                                                                • String ID: nul
                                                                • API String ID: 4209266947-2873401336
                                                                • Opcode ID: 7e80a516a745ed6860bd0dfcc581cad16810510cdf8a5752c9fff1a17d930d55
                                                                • Instruction ID: 69fb0d6c2a375d992d1c44f22f5e16fbd0091bd2758a2eb1c505c05730c5ac5b
                                                                • Opcode Fuzzy Hash: 7e80a516a745ed6860bd0dfcc581cad16810510cdf8a5752c9fff1a17d930d55
                                                                • Instruction Fuzzy Hash: 1F21A1315082059BDB209F68AC48E9D7BB8BF55721F200B09FDA0E72D0D7709849C760
                                                                APIs
                                                                • SetErrorMode.KERNEL32(00000001), ref: 00A5B297
                                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00A5B2EB
                                                                • __swprintf.LIBCMT ref: 00A5B304
                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,00A80980), ref: 00A5B342
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                                • String ID: %lu
                                                                • API String ID: 3164766367-685833217
                                                                • Opcode ID: ea822e336148cf549d2bcc0a3f554468856e3e2158ab6eac2987a05194a58611
                                                                • Instruction ID: 613881b4c8a69d7b52f4f2ba6b614d6a8407123fce036860e9f912bded3a093c
                                                                • Opcode Fuzzy Hash: ea822e336148cf549d2bcc0a3f554468856e3e2158ab6eac2987a05194a58611
                                                                • Instruction Fuzzy Hash: 12217435600108AFCB10DFA5CD85DEEB7B8FF89714B104069F905E7252DB71EA45CB61
                                                                APIs
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                  • Part of subcall function 00A4AA52: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00A4AA6F
                                                                  • Part of subcall function 00A4AA52: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A4AA82
                                                                  • Part of subcall function 00A4AA52: GetCurrentThreadId.KERNEL32 ref: 00A4AA89
                                                                  • Part of subcall function 00A4AA52: AttachThreadInput.USER32(00000000), ref: 00A4AA90
                                                                • GetFocus.USER32 ref: 00A4AC2A
                                                                  • Part of subcall function 00A4AA9B: GetParent.USER32(?), ref: 00A4AAA9
                                                                • GetClassNameW.USER32(?,?,00000100), ref: 00A4AC73
                                                                • EnumChildWindows.USER32(?,00A4ACEB), ref: 00A4AC9B
                                                                • __swprintf.LIBCMT ref: 00A4ACB5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                                • String ID: %s%d
                                                                • API String ID: 1941087503-1110647743
                                                                • Opcode ID: d94d571640bb87fa3db1082590166880cc1ccad2a76472efbeeae6920bb1a606
                                                                • Instruction ID: 8c1cdda14bbb75cac5ba651a46bb6d05478b0e7c24f24d023fca94bdfd5b7c31
                                                                • Opcode Fuzzy Hash: d94d571640bb87fa3db1082590166880cc1ccad2a76472efbeeae6920bb1a606
                                                                • Instruction Fuzzy Hash: 9511B179640209BBDF51BFA0DE85FEA376CAFA4710F008075FE08AA182DB705959DB71
                                                                APIs
                                                                • CharUpperBuffW.USER32(?,?), ref: 00A52318
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharUpper
                                                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                • API String ID: 3964851224-769500911
                                                                • Opcode ID: f2481b6da774f015ee73a91c560dd2d99957a7345eaa8bee0c1eec59de01f049
                                                                • Instruction ID: 892ba32fec3835f570618bcc0bf9c4723d45034d53d3f644b31be2a6c374bb4e
                                                                • Opcode Fuzzy Hash: f2481b6da774f015ee73a91c560dd2d99957a7345eaa8bee0c1eec59de01f049
                                                                • Instruction Fuzzy Hash: 14115E3091011C9FCF00EF94D9519FEB7B4FF26344B504569D81467292EB766D4ACF50
                                                                APIs
                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00A6F2F0
                                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00A6F320
                                                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00A6F453
                                                                • CloseHandle.KERNEL32(?), ref: 00A6F4D4
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                • String ID:
                                                                • API String ID: 2364364464-0
                                                                • Opcode ID: f34bf767237d16d40945ea7c5f38a28674ad0ed6260786bfa17a7e7f3afa3863
                                                                • Instruction ID: 5b62c9ecba9bc6abb81d43f17c72deca01aec9229e446d67a492a8620d9ab1f2
                                                                • Opcode Fuzzy Hash: f34bf767237d16d40945ea7c5f38a28674ad0ed6260786bfa17a7e7f3afa3863
                                                                • Instruction Fuzzy Hash: 668150716047009FD720EF28D896F6BB7E5AF84710F14892DFA999B2D2DB70AC418F91
                                                                APIs
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                  • Part of subcall function 00A7147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A7040D,?,?), ref: 00A71491
                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A7075D
                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A7079C
                                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00A707E3
                                                                • RegCloseKey.ADVAPI32(?,?), ref: 00A7080F
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00A7081C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                • String ID:
                                                                • API String ID: 3440857362-0
                                                                • Opcode ID: 39960f3e5ed1c7dbcc4d1c421dce5909b1667a9063a5f89a297c4f4cfdbb62e9
                                                                • Instruction ID: 10e3d33ff2c623a04d3514c63c0e4f825a7cb6b1f64c03f2c325558d96ddb039
                                                                • Opcode Fuzzy Hash: 39960f3e5ed1c7dbcc4d1c421dce5909b1667a9063a5f89a297c4f4cfdbb62e9
                                                                • Instruction Fuzzy Hash: BB513A71208208AFD714EF64CD81F6AB7F9BF84704F04891DF599972A2DB30E905CB92
                                                                APIs
                                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00A5EC62
                                                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00A5EC8B
                                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00A5ECCA
                                                                  • Part of subcall function 009F4D37: __itow.LIBCMT ref: 009F4D62
                                                                  • Part of subcall function 009F4D37: __swprintf.LIBCMT ref: 009F4DAC
                                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00A5ECEF
                                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00A5ECF7
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                • String ID:
                                                                • API String ID: 1389676194-0
                                                                • Opcode ID: 76cf9d638c353e7d8af96591c6b1dd4ce65aee6d3d33a00fd57ed4de931093f3
                                                                • Instruction ID: 924f68e61b7710cd6efac2a7af0ceec5e8056acc5bf2b0cb6e571b3eb5a250f6
                                                                • Opcode Fuzzy Hash: 76cf9d638c353e7d8af96591c6b1dd4ce65aee6d3d33a00fd57ed4de931093f3
                                                                • Instruction Fuzzy Hash: C0511535A00109DFCB05EF64C985EAEBBF5EF48314B188099E909AB3A2DB31ED55DF50
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4f543070fe649f64b194ec7fc464c5a5ff903b3ff9730b8abb9d557bf5c37d5d
                                                                • Instruction ID: 8e28285867a5297c1d3041e05cc3d829d35730569b6c47425f11a47cede29b6b
                                                                • Opcode Fuzzy Hash: 4f543070fe649f64b194ec7fc464c5a5ff903b3ff9730b8abb9d557bf5c37d5d
                                                                • Instruction Fuzzy Hash: 0D41D236900104BFD718DB68CC84FAEBBB8EB99310F14C165E91EE72E1D7709D41DA51
                                                                APIs
                                                                • GetCursorPos.USER32(?), ref: 009F2727
                                                                • ScreenToClient.USER32(00AB77B0,?), ref: 009F2744
                                                                • GetAsyncKeyState.USER32(00000001), ref: 009F2769
                                                                • GetAsyncKeyState.USER32(00000002), ref: 009F2777
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AsyncState$ClientCursorScreen
                                                                • String ID:
                                                                • API String ID: 4210589936-0
                                                                • Opcode ID: 8b1b703fc7c804f266ea246130ae2e7ae43281a10704b99b60de78de253c5431
                                                                • Instruction ID: 2bc40bd3e1c48fe4390a421fdd832be176de1347f2ce7860a1515a4f7d150330
                                                                • Opcode Fuzzy Hash: 8b1b703fc7c804f266ea246130ae2e7ae43281a10704b99b60de78de253c5431
                                                                • Instruction Fuzzy Hash: B7414D75604119FBDF19EFA8C844BEDBB74BB05374F20836AF928A6290C730AD54DB91
                                                                APIs
                                                                • GetWindowRect.USER32(?,?), ref: 00A495E8
                                                                • PostMessageW.USER32(?,00000201,00000001), ref: 00A49692
                                                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00A4969A
                                                                • PostMessageW.USER32(?,00000202,00000000), ref: 00A496A8
                                                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00A496B0
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessagePostSleep$RectWindow
                                                                • String ID:
                                                                • API String ID: 3382505437-0
                                                                • Opcode ID: 333d62323e1155016d0468e50150d8117b140af3f3513caf1136f15993fb2897
                                                                • Instruction ID: 15fc693d576d156c26eabf3013a488ebac0a703d3d9af6c174f4c52b17314271
                                                                • Opcode Fuzzy Hash: 333d62323e1155016d0468e50150d8117b140af3f3513caf1136f15993fb2897
                                                                • Instruction Fuzzy Hash: FE31CC75900219EFDB14CFA8D94DA9FBBB5FB84325F114229F924AB2D0C3B09924DB90
                                                                APIs
                                                                • IsWindowVisible.USER32(?), ref: 00A4BD9D
                                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A4BDBA
                                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A4BDF2
                                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00A4BE18
                                                                • _wcsstr.LIBCMT ref: 00A4BE22
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                • String ID:
                                                                • API String ID: 3902887630-0
                                                                • Opcode ID: e1c6088c8193c9c7ba1bdae3893b8326a9820b45ef9ec5ebb00712158bd89c74
                                                                • Instruction ID: 62c5bdd96add9135f468d79afc7b8834f4d4250a67d61b3c85e79afa71420d5b
                                                                • Opcode Fuzzy Hash: e1c6088c8193c9c7ba1bdae3893b8326a9820b45ef9ec5ebb00712158bd89c74
                                                                • Instruction Fuzzy Hash: 03212936608204BFEB259B759C0AEBB7BACDFC8760F104079F909CA191EB61CC519370
                                                                APIs
                                                                  • Part of subcall function 009F29E2: GetWindowLongW.USER32(?,000000EB), ref: 009F29F3
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00A7B804
                                                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00A7B829
                                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00A7B841
                                                                • GetSystemMetrics.USER32(00000004), ref: 00A7B86A
                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00A6155C,00000000), ref: 00A7B888
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$Long$MetricsSystem
                                                                • String ID:
                                                                • API String ID: 2294984445-0
                                                                • Opcode ID: 9b5f9da34b638f0f67e9af4313fd26e8ef8be8146487bcddc2bb90c19ebe67d4
                                                                • Instruction ID: c8589a36e3c1642dcd24577fa65ecf7e657f591de027041b21c29babcb41ce4b
                                                                • Opcode Fuzzy Hash: 9b5f9da34b638f0f67e9af4313fd26e8ef8be8146487bcddc2bb90c19ebe67d4
                                                                • Instruction Fuzzy Hash: 0821A6B1924215AFCB149F78CC04B6937A8FB45321F10C739F929D75E0D7708851DBA0
                                                                APIs
                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A49ED8
                                                                  • Part of subcall function 00A01821: _memmove.LIBCMT ref: 00A0185B
                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A49F0A
                                                                • __itow.LIBCMT ref: 00A49F22
                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A49F4A
                                                                • __itow.LIBCMT ref: 00A49F5B
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$__itow$_memmove
                                                                • String ID:
                                                                • API String ID: 2983881199-0
                                                                • Opcode ID: 136efe40c171cdbcbfee2e0e88806d6427cb34a15438b8624fd6dfd61ba1b5e0
                                                                • Instruction ID: 6d15e06d2c6898396388d6b4961180f7a8ead99308d9f8d41d705de7bbad67d2
                                                                • Opcode Fuzzy Hash: 136efe40c171cdbcbfee2e0e88806d6427cb34a15438b8624fd6dfd61ba1b5e0
                                                                • Instruction Fuzzy Hash: 3721A135600208BBDB10EBA4998AEEF7BA8EFD9750F044025F901DB281E770C9699792
                                                                APIs
                                                                • IsWindow.USER32(00000000), ref: 00A66159
                                                                • GetForegroundWindow.USER32 ref: 00A66170
                                                                • GetDC.USER32(00000000), ref: 00A661AC
                                                                • GetPixel.GDI32(00000000,?,00000003), ref: 00A661B8
                                                                • ReleaseDC.USER32(00000000,00000003), ref: 00A661F3
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$ForegroundPixelRelease
                                                                • String ID:
                                                                • API String ID: 4156661090-0
                                                                • Opcode ID: 7abcaa284af438f7d4fd1866b1a3ca90294472c0599a50489c710209768a9158
                                                                • Instruction ID: 0afb623af21f2c82d9a7a36df7085843ff7e2d186ffadcca10bd408023058868
                                                                • Opcode Fuzzy Hash: 7abcaa284af438f7d4fd1866b1a3ca90294472c0599a50489c710209768a9158
                                                                • Instruction Fuzzy Hash: BD21A475A006049FD700EFA5DD84EAABBF5EF88311F048479E94A97252DA74AC05CB90
                                                                APIs
                                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009F1729
                                                                • SelectObject.GDI32(?,00000000), ref: 009F1738
                                                                • BeginPath.GDI32(?), ref: 009F174F
                                                                • SelectObject.GDI32(?,00000000), ref: 009F1778
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ObjectSelect$BeginCreatePath
                                                                • String ID:
                                                                • API String ID: 3225163088-0
                                                                • Opcode ID: 36f5996585360c133a04af56bad8c2ccc1aa2942387b7acf4b26675d4629f986
                                                                • Instruction ID: b142c5fcfa71ae8b6b0a690a743199b311c1f492840afa92f3aa1f2d5b2f4fb2
                                                                • Opcode Fuzzy Hash: 36f5996585360c133a04af56bad8c2ccc1aa2942387b7acf4b26675d4629f986
                                                                • Instruction Fuzzy Hash: B5219D30804208EBDB11EFE4EC48B6D7BB8AB40321F144316F919A61B2D7B498D6CB90
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memcmp
                                                                • String ID:
                                                                • API String ID: 2931989736-0
                                                                • Opcode ID: 26bc26775cd30de236680972fcc86e62ccad6cc6639ca5166a699ac58d71cc7d
                                                                • Instruction ID: 28f2731f86bcd06995c4edb7788c10378d179f6e7dc310d4e9220e0858d93ced
                                                                • Opcode Fuzzy Hash: 26bc26775cd30de236680972fcc86e62ccad6cc6639ca5166a699ac58d71cc7d
                                                                • Instruction Fuzzy Hash: 7C01F5B7B021057BD61067109E82FFB732CAAA07A4F044435FE1A96342F7A1DE1582E4
                                                                APIs
                                                                • GetCurrentThreadId.KERNEL32 ref: 00A55075
                                                                • __beginthreadex.LIBCMT ref: 00A55093
                                                                • MessageBoxW.USER32(?,?,?,?), ref: 00A550A8
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00A550BE
                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00A550C5
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                • String ID:
                                                                • API String ID: 3824534824-0
                                                                • Opcode ID: bd747d917447b6b6a62a7e23bfb3c29f4f6e8347a9cf764cf8c1837eecddbce0
                                                                • Instruction ID: b8257e290aca473c8b038a40523badd2a9e013943272fd883d2d8e9a1505ee80
                                                                • Opcode Fuzzy Hash: bd747d917447b6b6a62a7e23bfb3c29f4f6e8347a9cf764cf8c1837eecddbce0
                                                                • Instruction Fuzzy Hash: FE11C276D08608AFC741DBE89C18ADF7BA8AB85321F140365F814D33A1D6B2894987E0
                                                                APIs
                                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A48E3C
                                                                • GetLastError.KERNEL32(?,00A48900,?,?,?), ref: 00A48E46
                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00A48900,?,?,?), ref: 00A48E55
                                                                • HeapAlloc.KERNEL32(00000000,?,00A48900,?,?,?), ref: 00A48E5C
                                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A48E73
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                • String ID:
                                                                • API String ID: 842720411-0
                                                                • Opcode ID: 0ca9c1e6772015655fffca0b55c0f4e7fe7a10bc0016fed5c74671045205b0e3
                                                                • Instruction ID: d35e379c21a2bfbd5d5a87aeb9314e0200a84349d7f2c8db8fa5636ad81ae2c8
                                                                • Opcode Fuzzy Hash: 0ca9c1e6772015655fffca0b55c0f4e7fe7a10bc0016fed5c74671045205b0e3
                                                                • Instruction Fuzzy Hash: A801FB75601204AFDB209FE5EC89D6B7FADEF89765B100569F889C3220DA71DC15CB70
                                                                APIs
                                                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A5581B
                                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00A55829
                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A55831
                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00A5583B
                                                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A55877
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                • String ID:
                                                                • API String ID: 2833360925-0
                                                                • Opcode ID: 799baec73c62c1125567f681192bbc564eeea05500bbe4c2e05759ac4d2c38fa
                                                                • Instruction ID: 16c352be3e82eb1c12e1656e361fe3ea31842124cd485206f7bc3ed2dc26afa3
                                                                • Opcode Fuzzy Hash: 799baec73c62c1125567f681192bbc564eeea05500bbe4c2e05759ac4d2c38fa
                                                                • Instruction Fuzzy Hash: EC015731D11A299BCF00DFF9E899AEDBBB8BB08712F004156E901B2140DB319558DBA1
                                                                APIs
                                                                • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A47C62,80070057,?,?,?,00A48073), ref: 00A47D45
                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A47C62,80070057,?,?), ref: 00A47D60
                                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A47C62,80070057,?,?), ref: 00A47D6E
                                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A47C62,80070057,?), ref: 00A47D7E
                                                                • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A47C62,80070057,?,?), ref: 00A47D8A
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                • String ID:
                                                                • API String ID: 3897988419-0
                                                                • Opcode ID: 9d3ac9da540fbe0c4562c8d8296fe3a4b3b55fce6f6dbe9227fe8c4fae481e7d
                                                                • Instruction ID: 5cc1114ed6c988d7bd0e5315151094c7349475e04e3306e484c8c28780d1001b
                                                                • Opcode Fuzzy Hash: 9d3ac9da540fbe0c4562c8d8296fe3a4b3b55fce6f6dbe9227fe8c4fae481e7d
                                                                • Instruction Fuzzy Hash: 6F017CBAA15214ABDB118F98DD44FAE7BADEF84752F154024F908D6210E771ED41CBA0
                                                                APIs
                                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A48CDE
                                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A48CE8
                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A48CF7
                                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A48CFE
                                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A48D14
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                • String ID:
                                                                • API String ID: 44706859-0
                                                                • Opcode ID: 3ce81675064be78feaf2eb94996695df9edf2319c1fab530f11debe8c47350c6
                                                                • Instruction ID: 120a33e2fb0bff69d5f1e7ac337f8fcb370ed09246daf2281008c0a3cde21ac0
                                                                • Opcode Fuzzy Hash: 3ce81675064be78feaf2eb94996695df9edf2319c1fab530f11debe8c47350c6
                                                                • Instruction Fuzzy Hash: D3F0AF35201304AFEB504FE4ACCCE6B3BACEF89754B104125F904C6190DA609C06DB60
                                                                APIs
                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A48D3F
                                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A48D49
                                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A48D58
                                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A48D5F
                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A48D75
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                • String ID:
                                                                • API String ID: 44706859-0
                                                                • Opcode ID: 3c6fc055985b19f21a00b4a3e85c7b4581f25ffed2cd241ab6b22d8c60d4eca0
                                                                • Instruction ID: 1157d511f8cf06809d7da2775f9c01d40763ae6bc4c76cfa59db1d554ac436ca
                                                                • Opcode Fuzzy Hash: 3c6fc055985b19f21a00b4a3e85c7b4581f25ffed2cd241ab6b22d8c60d4eca0
                                                                • Instruction Fuzzy Hash: E7F0A935201304AFEB614FA4EC88F6B3BACEF89764F040229F954C6190DB609D0AEB60
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00A4CD90
                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00A4CDA7
                                                                • MessageBeep.USER32(00000000), ref: 00A4CDBF
                                                                • KillTimer.USER32(?,0000040A), ref: 00A4CDDB
                                                                • EndDialog.USER32(?,00000001), ref: 00A4CDF5
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                • String ID:
                                                                • API String ID: 3741023627-0
                                                                • Opcode ID: 3b15fd83e6596115dd963ed91531daba7e9b3868e10a1604d97276bcf2c87518
                                                                • Instruction ID: 54acfa5b6b1ce0a26ee288f08f5b1fbd718c3a476ec345837cbd2d402814b500
                                                                • Opcode Fuzzy Hash: 3b15fd83e6596115dd963ed91531daba7e9b3868e10a1604d97276bcf2c87518
                                                                • Instruction Fuzzy Hash: C801A934901708ABEB619B60DD4EFA67B78FF40715F000679F586A10E1DBF4A9598B80
                                                                APIs
                                                                • EndPath.GDI32(?), ref: 009F179B
                                                                • StrokeAndFillPath.GDI32(?,?,00A2BBC9,00000000,?), ref: 009F17B7
                                                                • SelectObject.GDI32(?,00000000), ref: 009F17CA
                                                                • DeleteObject.GDI32 ref: 009F17DD
                                                                • StrokePath.GDI32(?), ref: 009F17F8
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                • String ID:
                                                                • API String ID: 2625713937-0
                                                                • Opcode ID: bbe7f1eb3355e8ccc571119d53b51310a992044f9ab54218262375235a1e7515
                                                                • Instruction ID: 0ec59c3cafabf0ac0b7049b9f316f9edb3dfb9e2b266554e82d02fe1d6e21555
                                                                • Opcode Fuzzy Hash: bbe7f1eb3355e8ccc571119d53b51310a992044f9ab54218262375235a1e7515
                                                                • Instruction Fuzzy Hash: 80F0B230008608EBDB55EFE6EC4CF693BA9AB40326F148314E92D551F1C7B589DADF90
                                                                APIs
                                                                • CoInitialize.OLE32(00000000), ref: 00A5CA75
                                                                • CoCreateInstance.OLE32(00A83D3C,00000000,00000001,00A83BAC,?), ref: 00A5CA8D
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                • CoUninitialize.OLE32 ref: 00A5CCFA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                • String ID: .lnk
                                                                • API String ID: 2683427295-24824748
                                                                • Opcode ID: aa8863c4b293181325b19773820bc157082749f462926dcac76ec61086560458
                                                                • Instruction ID: 3260bad6925a620096a5b69c899fef476e4cd75b425b849eda920adb20ad4f90
                                                                • Opcode Fuzzy Hash: aa8863c4b293181325b19773820bc157082749f462926dcac76ec61086560458
                                                                • Instruction Fuzzy Hash: 28A11A71104209AFD300EF64DC91EABB7E8FF94758F00491CF655972A2EB70EA49CB92
                                                                APIs
                                                                  • Part of subcall function 00A10FE6: std::exception::exception.LIBCMT ref: 00A1101C
                                                                  • Part of subcall function 00A10FE6: __CxxThrowException@8.LIBCMT ref: 00A11031
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                  • Part of subcall function 00A01680: _memmove.LIBCMT ref: 00A016DB
                                                                • __swprintf.LIBCMT ref: 009FE598
                                                                Strings
                                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 009FE431
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                • API String ID: 1943609520-557222456
                                                                • Opcode ID: 7d2b068a534c3a4915c933c098b8517dccc66e4a99a4ef956367d00849efe487
                                                                • Instruction ID: ffd20ab144cae9af594aefe6d2f5dfa338c4748ed2222b9085ff05ad2e0cfb7b
                                                                • Opcode Fuzzy Hash: 7d2b068a534c3a4915c933c098b8517dccc66e4a99a4ef956367d00849efe487
                                                                • Instruction Fuzzy Hash: 07919E715082099FC714EF28D996CBFB7B8EF95710F04091DF5869B2A1EB20EE44CB92
                                                                APIs
                                                                • __startOneArgErrorHandling.LIBCMT ref: 00A152CD
                                                                  • Part of subcall function 00A20320: __87except.LIBCMT ref: 00A2035B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ErrorHandling__87except__start
                                                                • String ID: pow
                                                                • API String ID: 2905807303-2276729525
                                                                • Opcode ID: b80f6599b29e8fb40da27d0523ff1e339e74e84b14254f2d2e4ef2b861a8d7ce
                                                                • Instruction ID: 46fece90cc5ad7e6d4e4c76ab05e3e7109b1233e08150d8736bcc7d347c048d4
                                                                • Opcode Fuzzy Hash: b80f6599b29e8fb40da27d0523ff1e339e74e84b14254f2d2e4ef2b861a8d7ce
                                                                • Instruction Fuzzy Hash: 51515D72D09601C7CB11F73CEA517EA6BA49B80750F308978E4D18A1EBEF788CC59B46
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: #$+
                                                                • API String ID: 0-2552117581
                                                                • Opcode ID: 481be1ce10480133db4c115583203decef6fd568c650c93077d959a1745b6f70
                                                                • Instruction ID: 10de720877f0e8b3e289f589a3df30041c03f799d9db122f95373c866e243e5c
                                                                • Opcode Fuzzy Hash: 481be1ce10480133db4c115583203decef6fd568c650c93077d959a1745b6f70
                                                                • Instruction Fuzzy Hash: 4F510179904255CFDF25DF68C880AFA7BB4EFAA310F144055EC91AB2D0D774AC82CB62
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memset$_memmove
                                                                • String ID: ERCP
                                                                • API String ID: 2532777613-1384759551
                                                                • Opcode ID: 2313fd42266a4dbdcd7413a2ad732284accf699a87778fa39fef78bf83edea3e
                                                                • Instruction ID: f44bb883746af40a0a9f4bea27c27043b724dd20e6cedf2db87862adcecd4853
                                                                • Opcode Fuzzy Hash: 2313fd42266a4dbdcd7413a2ad732284accf699a87778fa39fef78bf83edea3e
                                                                • Instruction Fuzzy Hash: AF51D4B2A007099FDB24CFA4D8817AABBF4EF44311F24856EE54ADB290E770D585CB40
                                                                APIs
                                                                  • Part of subcall function 00A51CBB: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A49E4E,?,?,00000034,00000800,?,00000034), ref: 00A51CE5
                                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00A4A3F7
                                                                  • Part of subcall function 00A51C86: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A49E7D,?,?,00000800,?,00001073,00000000,?,?), ref: 00A51CB0
                                                                  • Part of subcall function 00A51BDD: GetWindowThreadProcessId.USER32(?,?), ref: 00A51C08
                                                                  • Part of subcall function 00A51BDD: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00A49E12,00000034,?,?,00001004,00000000,00000000), ref: 00A51C18
                                                                  • Part of subcall function 00A51BDD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00A49E12,00000034,?,?,00001004,00000000,00000000), ref: 00A51C2E
                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A4A464
                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00A4A4B1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                • String ID: @
                                                                • API String ID: 4150878124-2766056989
                                                                • Opcode ID: 48172164ccd11ab0775efe0f435f6b268945eba7a3cebc6dd7c76086d925f61f
                                                                • Instruction ID: c90b14de7fd55418954c0317f58878ed0b89669f6780a25031a22cb77dfef1cd
                                                                • Opcode Fuzzy Hash: 48172164ccd11ab0775efe0f435f6b268945eba7a3cebc6dd7c76086d925f61f
                                                                • Instruction Fuzzy Hash: 19412A7694121CBFDB10DBA4CD85BEEBBB8EF49300F104095FA55B7180DA716E89CBA1
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00A77A86
                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00A77A9A
                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A77ABE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Window
                                                                • String ID: SysMonthCal32
                                                                • API String ID: 2326795674-1439706946
                                                                • Opcode ID: e145993a2820e02d83cbe4225265d50de866648256000d0bbef5e463ba7905bc
                                                                • Instruction ID: 688c2a4b6138332e0833d8c6157b7fdd8cc172eef8a5b114d4fa8d5076934845
                                                                • Opcode Fuzzy Hash: e145993a2820e02d83cbe4225265d50de866648256000d0bbef5e463ba7905bc
                                                                • Instruction Fuzzy Hash: 6221A332654218BFEF11CF94CC46FEE3B69EF48764F118214FE196B1D0DAB1A8558BA0
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00A7826F
                                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00A7827D
                                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00A78284
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$DestroyWindow
                                                                • String ID: msctls_updown32
                                                                • API String ID: 4014797782-2298589950
                                                                • Opcode ID: 5565719789031a2b9a290704ee9d2bc3d6f4198ebaa7ae91eca36c03beaae460
                                                                • Instruction ID: 06e551bf410c9b3aea69fef2f5cffb7f24a4f0b70059bc428206ffe5b0b8221b
                                                                • Opcode Fuzzy Hash: 5565719789031a2b9a290704ee9d2bc3d6f4198ebaa7ae91eca36c03beaae460
                                                                • Instruction Fuzzy Hash: 572181B1604208AFDB00DF54CC85DAB37EDEF99364B048159FA159B262CB71EC51CBA0
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00A77360
                                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00A77370
                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00A77395
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$MoveWindow
                                                                • String ID: Listbox
                                                                • API String ID: 3315199576-2633736733
                                                                • Opcode ID: b0c5af472680dfdcd29d9eb1fb254b89fcb154af5c07c4a6961c8b70c80c91bb
                                                                • Instruction ID: 1555122a16cad9808f211d0f81a60dff4c4c642e1518a8a70efc6eb0e605137f
                                                                • Opcode Fuzzy Hash: b0c5af472680dfdcd29d9eb1fb254b89fcb154af5c07c4a6961c8b70c80c91bb
                                                                • Instruction Fuzzy Hash: 7F219232614118BFEF128F54CC85FBF37AAEF89764F11C124F9189B190D671AC519BA0
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00A77D97
                                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00A77DAC
                                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00A77DB9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID: msctls_trackbar32
                                                                • API String ID: 3850602802-1010561917
                                                                • Opcode ID: 5a905a4956df6ef579ffcda83c38cad49ca433ee2ca207b42431cb6ff48c785c
                                                                • Instruction ID: 9643508adde6c2e23ae84741d8c02bd5ec76e0946792744fbdf7a4a2d3fd3be2
                                                                • Opcode Fuzzy Hash: 5a905a4956df6ef579ffcda83c38cad49ca433ee2ca207b42431cb6ff48c785c
                                                                • Instruction Fuzzy Hash: 7A11E372244208BEEF209F64CC05FEB37A9EF89B64F118518FA45A60A1D672A851DB20
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00A3027A,?), ref: 00A6C6E7
                                                                • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00A6C6F9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                • API String ID: 2574300362-1816364905
                                                                • Opcode ID: 1641d0825dad036d30d834b464360b7c753c841659c940c931f2bda0ba6072bd
                                                                • Instruction ID: a7d84471c702cee9f4e4ce7eb7933a6509ee99cb9ddb516a13fb8838f226066f
                                                                • Opcode Fuzzy Hash: 1641d0825dad036d30d834b464360b7c753c841659c940c931f2bda0ba6072bd
                                                                • Instruction Fuzzy Hash: 1FE017B9620713AFD7609B69DC4DF6676E8FF04765B90882AE8E5D2250E770D8848F20
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00A04AF7,?), ref: 00A04BB8
                                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00A04BCA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                • API String ID: 2574300362-1355242751
                                                                • Opcode ID: 94ede0781fdb86105768bbcde6def2f9c9a7d7126a7e95d732819a6c366cc1d8
                                                                • Instruction ID: f2f018461f28e1e8b16c1da68e9332001433969c680add0c38c1dc1dffb8aeb0
                                                                • Opcode Fuzzy Hash: 94ede0781fdb86105768bbcde6def2f9c9a7d7126a7e95d732819a6c366cc1d8
                                                                • Instruction Fuzzy Hash: 37D017B0510B129FD7209F71EC08B0B76E5BF0A761F119C6AD886D6594EB70D884CB11
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00A04B44,?,00A049D4,?,?,00A027AF,?,00000001), ref: 00A04B85
                                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00A04B97
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                • API String ID: 2574300362-3689287502
                                                                • Opcode ID: 1af47b542c9d0cbe60f07dd10ae9b70a5d0998f801466835d057e26c678a9b2b
                                                                • Instruction ID: 5ce56c886be1aef027af25e71cfd02693971f411041a8501bf83d12a9532b6ad
                                                                • Opcode Fuzzy Hash: 1af47b542c9d0cbe60f07dd10ae9b70a5d0998f801466835d057e26c678a9b2b
                                                                • Instruction Fuzzy Hash: 60D017B05107129FD720AF71EC18B0A76E4BF0A761F518C2AD486E2590E770E884CB10
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00A71696), ref: 00A71455
                                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A71467
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                                • API String ID: 2574300362-4033151799
                                                                • Opcode ID: fa0b1fd1dec11ad39cce2673c413685df822776bded08e59f84cb85a4cf5faa5
                                                                • Instruction ID: 14f37cb54ddb2a6ccf137d68b1c1bc92d262557667b6e0843b988a73e563d8e7
                                                                • Opcode Fuzzy Hash: fa0b1fd1dec11ad39cce2673c413685df822776bded08e59f84cb85a4cf5faa5
                                                                • Instruction Fuzzy Hash: DDD01770510712AFE7209FB9CC0CB4676E4AF067A5B11CD2A94DAD35A0EB70D8C4CB50
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00A05E3D), ref: 00A055FE
                                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00A05610
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                • API String ID: 2574300362-192647395
                                                                • Opcode ID: 8f34466546cee424fd8c997668964db6d5fdd30ce407644cdeaee2ece6a8238e
                                                                • Instruction ID: bbd6a14efc4252a228e9474b1a117171ce17a0e677835e41fa08a2adf6a0de2f
                                                                • Opcode Fuzzy Hash: 8f34466546cee424fd8c997668964db6d5fdd30ce407644cdeaee2ece6a8238e
                                                                • Instruction Fuzzy Hash: 17D01774D20B129FE760AF71D818A1776E4AF04765F5A8C2AD486D2191E674C884CB54
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00A693DE,?,00A80980), ref: 00A697D8
                                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00A697EA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                                • API String ID: 2574300362-199464113
                                                                • Opcode ID: d3c98470dc50bf2ceb53e54529e96687e29819cd0515695f6beb387afe1bdf85
                                                                • Instruction ID: 9fc5ad6f9f45a7dae43ca2182d11c4731235bc428501e274909a556c1cd608f6
                                                                • Opcode Fuzzy Hash: d3c98470dc50bf2ceb53e54529e96687e29819cd0515695f6beb387afe1bdf85
                                                                • Instruction Fuzzy Hash: B3D017705207139FD720AF71D888A06B6E8BF09BA1B118C2AD486E2190EB70C884CB12
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: c75eb4e8425621deb664da7e013a9090f5666728bc80f289582682d5773f082e
                                                                • Instruction ID: 8306f7c56809b78e4aae37fcdd0fdf524a1602af74821dd8c109920ae9375861
                                                                • Opcode Fuzzy Hash: c75eb4e8425621deb664da7e013a9090f5666728bc80f289582682d5773f082e
                                                                • Instruction Fuzzy Hash: CAC17179A10216EFCB14CF98C884DAEB7F5FF88714B218598E805DB251DB31ED85CB90
                                                                APIs
                                                                • CharLowerBuffW.USER32(?,?), ref: 00A6E7A7
                                                                • CharLowerBuffW.USER32(?,?), ref: 00A6E7EA
                                                                  • Part of subcall function 00A6DE8E: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00A6DEAE
                                                                • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00A6E9EA
                                                                • _memmove.LIBCMT ref: 00A6E9FD
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: BuffCharLower$AllocVirtual_memmove
                                                                • String ID:
                                                                • API String ID: 3659485706-0
                                                                • Opcode ID: 71951b2884e53f3077952d787931de6c25ec824af831c1d806f83f2014c73542
                                                                • Instruction ID: eaab9b31e0e6b4fbbdf13f738582198cf10713a9f24fcf55bc5eb6065f4d277c
                                                                • Opcode Fuzzy Hash: 71951b2884e53f3077952d787931de6c25ec824af831c1d806f83f2014c73542
                                                                • Instruction Fuzzy Hash: 2CC15675A083019FC714DF28C480A6ABBF4FF89714F14896EF8999B391D771E946CB82
                                                                APIs
                                                                • CoInitialize.OLE32(00000000), ref: 00A687AD
                                                                • CoUninitialize.OLE32 ref: 00A687B8
                                                                  • Part of subcall function 00A7DF09: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00A68A0E,?,00000000), ref: 00A7DF71
                                                                • VariantInit.OLEAUT32(?), ref: 00A687C3
                                                                • VariantClear.OLEAUT32(?), ref: 00A68A94
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                • String ID:
                                                                • API String ID: 780911581-0
                                                                • Opcode ID: 4630f6cf3a06ab2503a52993abd0026f69fb5b3dffcc9104096719a1b8d0b6d7
                                                                • Instruction ID: de99b1b2028245d765984f0323c5c854d456658e798965d7b1525f1fb2705e39
                                                                • Opcode Fuzzy Hash: 4630f6cf3a06ab2503a52993abd0026f69fb5b3dffcc9104096719a1b8d0b6d7
                                                                • Instruction Fuzzy Hash: C0A13575204B059FC710DF64C481B2AB7F8BF88354F158949FA9A9B3A2CB34ED45CB92
                                                                APIs
                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00A83C4C,?), ref: 00A48308
                                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00A83C4C,?), ref: 00A48320
                                                                • CLSIDFromProgID.OLE32(?,?,00000000,00A80988,000000FF,?,00000000,00000800,00000000,?,00A83C4C,?), ref: 00A48345
                                                                • _memcmp.LIBCMT ref: 00A48366
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: FromProg$FreeTask_memcmp
                                                                • String ID:
                                                                • API String ID: 314563124-0
                                                                • Opcode ID: baf0b544aa8c9e3c1256670929f58f95a52166712abdd52c587bfde4993a2c89
                                                                • Instruction ID: 44fb9ea15dc5c2b4c0aec2d1e7f7f714cf672dc260da74f78c54910814523ddc
                                                                • Opcode Fuzzy Hash: baf0b544aa8c9e3c1256670929f58f95a52166712abdd52c587bfde4993a2c89
                                                                • Instruction Fuzzy Hash: F4814A75A00109EFCB00DFD8D988EEEB7B9FF89315F204558E516AB250DB75AE06CB60
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Variant$AllocClearCopyInitString
                                                                • String ID:
                                                                • API String ID: 2808897238-0
                                                                • Opcode ID: 99555822abe46c82ed8b999d76bb119cc9c950254f5b79253b3c104b39da39de
                                                                • Instruction ID: 929d33abe4e7937c39b25414d4d8470a3a1fb66635a6dc73cee991170282409a
                                                                • Opcode Fuzzy Hash: 99555822abe46c82ed8b999d76bb119cc9c950254f5b79253b3c104b39da39de
                                                                • Instruction Fuzzy Hash: 3251C938608745DFDB209F79D895A3DF3E6AF85310F30881FE546DB2A2DB7098808715
                                                                APIs
                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00A6F526
                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00A6F534
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                • Process32NextW.KERNEL32(00000000,?), ref: 00A6F5F4
                                                                • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00A6F603
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                • String ID:
                                                                • API String ID: 2576544623-0
                                                                • Opcode ID: c5f4a3e1b1a2538ed11946686af9eead9081e918b63aa750c15ed004be4c6c6d
                                                                • Instruction ID: 839dc776559cff47ea9990dedcbb66f5106ac0a9d46d1e283f2324e389ffb62f
                                                                • Opcode Fuzzy Hash: c5f4a3e1b1a2538ed11946686af9eead9081e918b63aa750c15ed004be4c6c6d
                                                                • Instruction Fuzzy Hash: 59515D71504315AFD310EF64EC86EABB7E8EF94750F00492DF596972A1EB70E908CB92
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                • String ID:
                                                                • API String ID: 2782032738-0
                                                                • Opcode ID: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                                • Instruction ID: 45dcf5c8dffb90a8ce0f600a49d1e2999705757037ece6ebb8335f06e4ce7035
                                                                • Opcode Fuzzy Hash: a7c34a093fdd5ab58b6ffc98053f9d5ae49c5acda348f4cccab4e545be81f79d
                                                                • Instruction Fuzzy Hash: D541B53560070A9BDF28CF6DC9809EF7BB6AF493A0B24813DE8598B640D7719DC18B44
                                                                APIs
                                                                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00A4A68A
                                                                • __itow.LIBCMT ref: 00A4A6BB
                                                                  • Part of subcall function 00A4A90B: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00A4A976
                                                                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00A4A724
                                                                • __itow.LIBCMT ref: 00A4A77B
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$__itow
                                                                • String ID:
                                                                • API String ID: 3379773720-0
                                                                • Opcode ID: c9f6ff1b633bdd1dcb350dbc9da14bf425eaf5374063a67e6c4142be5845475c
                                                                • Instruction ID: d9b132def512ac3ce76f4b2ea04fa761ab99df30812426696acfd0986741427d
                                                                • Opcode Fuzzy Hash: c9f6ff1b633bdd1dcb350dbc9da14bf425eaf5374063a67e6c4142be5845475c
                                                                • Instruction Fuzzy Hash: 57419274A4020DAFDF21EF54D956BEE7BB9EF98750F040029F905A72C1DB709944CBA2
                                                                APIs
                                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 00A670BC
                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A670CC
                                                                  • Part of subcall function 009F4D37: __itow.LIBCMT ref: 009F4D62
                                                                  • Part of subcall function 009F4D37: __swprintf.LIBCMT ref: 009F4DAC
                                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00A67130
                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A6713C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$__itow__swprintfsocket
                                                                • String ID:
                                                                • API String ID: 2214342067-0
                                                                • Opcode ID: 0bc258de26674d5e7f01193af3b686dab0a7f8813a08ecd0dce5f31e65d41521
                                                                • Instruction ID: 81f08afa122070593a4612da9776f25c7c5ec61cc1a1096a27db2b0ab63ed4bc
                                                                • Opcode Fuzzy Hash: 0bc258de26674d5e7f01193af3b686dab0a7f8813a08ecd0dce5f31e65d41521
                                                                • Instruction Fuzzy Hash: 66419F757402046FEB20AF64DC86F7E77E89B84B14F048558FB599B3D2DB709D018B91
                                                                APIs
                                                                • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00A80980), ref: 00A66B92
                                                                • _strlen.LIBCMT ref: 00A66BC4
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _strlen
                                                                • String ID:
                                                                • API String ID: 4218353326-0
                                                                • Opcode ID: 35e4e6cb2691fa7a9197a399405511f0c051f8c2247f0e65811bfc2103d74362
                                                                • Instruction ID: 18f6e134232af2d66df27768d38c8ecee2c0b9277ef5b2d41d0fbcb5cd86d564
                                                                • Opcode Fuzzy Hash: 35e4e6cb2691fa7a9197a399405511f0c051f8c2247f0e65811bfc2103d74362
                                                                • Instruction Fuzzy Hash: 75419175A00508ABCB14EBA4DDD5EBEB3B9EF58310F148155F91AAB2D2DF30AD41CB90
                                                                APIs
                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A78F03
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: InvalidateRect
                                                                • String ID:
                                                                • API String ID: 634782764-0
                                                                • Opcode ID: ed670b1416e47702ca3a1c76ddf5f96a814b2a100fd0d0378c5006c54fc65a7a
                                                                • Instruction ID: d0cf59711a1f2ba0af54d1d259b1149d4bd02bbe2b1fcb5bf80be9a41b1bf5dd
                                                                • Opcode Fuzzy Hash: ed670b1416e47702ca3a1c76ddf5f96a814b2a100fd0d0378c5006c54fc65a7a
                                                                • Instruction Fuzzy Hash: C131E430681108AFEF249B58CC4DFAD37A6EB46320F24C511FA19D62E1DFB9E950CB52
                                                                APIs
                                                                • ClientToScreen.USER32(?,?), ref: 00A7B1D2
                                                                • GetWindowRect.USER32(?,?), ref: 00A7B248
                                                                • PtInRect.USER32(?,?,00A7C6BC), ref: 00A7B258
                                                                • MessageBeep.USER32(00000000), ref: 00A7B2C9
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                                • String ID:
                                                                • API String ID: 1352109105-0
                                                                • Opcode ID: f2e89a50e3fd4dc4c6724479f1692e95a997de84499e5e7ac75b45835da56145
                                                                • Instruction ID: 2a6f5df77ec305c1ea3df51cd9c7324193637f256a2129317524eb5905e9eb7a
                                                                • Opcode Fuzzy Hash: f2e89a50e3fd4dc4c6724479f1692e95a997de84499e5e7ac75b45835da56145
                                                                • Instruction Fuzzy Hash: 2B415DB1A151159FDB11CF98CC84BAD7BF5FF89311F14C1A9E81C9B262D730A942CBA0
                                                                APIs
                                                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00A51326
                                                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00A51342
                                                                • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00A513A8
                                                                • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00A513FA
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                • String ID:
                                                                • API String ID: 432972143-0
                                                                • Opcode ID: 1322c132576be8ba44b509cf496234fce1bb956e8634baee232d1902ebd9fad1
                                                                • Instruction ID: b71a12277cafb7c35ff223265a97d71b47e43e9256ab3aaa0682dbb72eb09e97
                                                                • Opcode Fuzzy Hash: 1322c132576be8ba44b509cf496234fce1bb956e8634baee232d1902ebd9fad1
                                                                • Instruction Fuzzy Hash: C2314870A40608AEFF74CB65CC15BFD7BB9BB44332F04825AEC905A6D1E374894E9B61
                                                                APIs
                                                                • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00A51465
                                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00A51481
                                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 00A514E0
                                                                • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00A51532
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                • String ID:
                                                                • API String ID: 432972143-0
                                                                • Opcode ID: 18a0e7b94c0923aa322ac6f7df77f526500a8cbc6e6ac6c421fa17443a3312e4
                                                                • Instruction ID: 7037a634a4c3aac7e55eaa3e57958127f2af4f5fcce3e8a3bbf5d3a6cde3f380
                                                                • Opcode Fuzzy Hash: 18a0e7b94c0923aa322ac6f7df77f526500a8cbc6e6ac6c421fa17443a3312e4
                                                                • Instruction Fuzzy Hash: 7B3169B09406086EFF34CB659C04FFABBB5BB89312F08831AEC81521D1D3788D4D8B62
                                                                APIs
                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00A2642B
                                                                • __isleadbyte_l.LIBCMT ref: 00A26459
                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A26487
                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A264BD
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                • String ID:
                                                                • API String ID: 3058430110-0
                                                                • Opcode ID: 1a4b70ffd6b398c4840641fbd0a9b5bfdb5146c38e844db4a64722fe70672697
                                                                • Instruction ID: 7ea9fa108f07c88c3b0040b6853a59352289bb0d8a3360cfe2ace0bb94cbe885
                                                                • Opcode Fuzzy Hash: 1a4b70ffd6b398c4840641fbd0a9b5bfdb5146c38e844db4a64722fe70672697
                                                                • Instruction Fuzzy Hash: E731D231602266AFDB21AF69EE44BAA7BB5FF40320F154178E8A487190DB31E990D750
                                                                APIs
                                                                • GetForegroundWindow.USER32 ref: 00A7553F
                                                                  • Part of subcall function 00A53B34: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A53B4E
                                                                  • Part of subcall function 00A53B34: GetCurrentThreadId.KERNEL32 ref: 00A53B55
                                                                  • Part of subcall function 00A53B34: AttachThreadInput.USER32(00000000,?,00A555C0), ref: 00A53B5C
                                                                • GetCaretPos.USER32(?), ref: 00A75550
                                                                • ClientToScreen.USER32(00000000,?), ref: 00A7558B
                                                                • GetForegroundWindow.USER32 ref: 00A75591
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                • String ID:
                                                                • API String ID: 2759813231-0
                                                                • Opcode ID: ad442a4abe39d415a08168c985becb7797ef330b477d5f13301826bb89aadd1c
                                                                • Instruction ID: 226fc6dda28d558cfa8efa37f63340db3ec269c03d4a05c914d4ba82bd6d5a40
                                                                • Opcode Fuzzy Hash: ad442a4abe39d415a08168c985becb7797ef330b477d5f13301826bb89aadd1c
                                                                • Instruction Fuzzy Hash: 13311C72D00108AFDB00EFA5DD85AEFB7F9EF98304F10406AE515E7241DA71AA058BA0
                                                                APIs
                                                                  • Part of subcall function 009F29E2: GetWindowLongW.USER32(?,000000EB), ref: 009F29F3
                                                                • GetCursorPos.USER32(?), ref: 00A7CB7A
                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00A2BCEC,?,?,?,?,?), ref: 00A7CB8F
                                                                • GetCursorPos.USER32(?), ref: 00A7CBDC
                                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00A2BCEC,?,?,?), ref: 00A7CC16
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                • String ID:
                                                                • API String ID: 2864067406-0
                                                                • Opcode ID: 92673c1ebb68cf33f1f688c4728394a8c22a828e43ec0002459150c61d09f793
                                                                • Instruction ID: 968ea4e0853d93e8758c51256548cd49e329a20c8624da99bc4f6af14978de4a
                                                                • Opcode Fuzzy Hash: 92673c1ebb68cf33f1f688c4728394a8c22a828e43ec0002459150c61d09f793
                                                                • Instruction Fuzzy Hash: 46318F35600018AFCB15CF94CC59EBA7BB5EB89320F04C099F9499B261C7319D51EFA0
                                                                APIs
                                                                • __setmode.LIBCMT ref: 00A10BE2
                                                                  • Part of subcall function 00A0402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A57E51,?,?,00000000), ref: 00A04041
                                                                  • Part of subcall function 00A0402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A57E51,?,?,00000000,?,?), ref: 00A04065
                                                                • _fprintf.LIBCMT ref: 00A10C19
                                                                • OutputDebugStringW.KERNEL32(?), ref: 00A4694C
                                                                  • Part of subcall function 00A14CCA: _flsall.LIBCMT ref: 00A14CE3
                                                                • __setmode.LIBCMT ref: 00A10C4E
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                • String ID:
                                                                • API String ID: 521402451-0
                                                                • Opcode ID: 1da1603f4e170aa0ce8e7ddd693c58507af2dcdcf20d45c1f3fc37f84c4fafa0
                                                                • Instruction ID: 3afdb837d03014ad66dd63d6553c1d11a8e6dc101f572491067e7173d1406bc8
                                                                • Opcode Fuzzy Hash: 1da1603f4e170aa0ce8e7ddd693c58507af2dcdcf20d45c1f3fc37f84c4fafa0
                                                                • Instruction Fuzzy Hash: 7D1124769081087EC708B7A8AD42EFE7B6DAF89321F100115F204A71C2DF6558C64BE1
                                                                APIs
                                                                  • Part of subcall function 00A48D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A48D3F
                                                                  • Part of subcall function 00A48D28: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A48D49
                                                                  • Part of subcall function 00A48D28: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A48D58
                                                                  • Part of subcall function 00A48D28: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A48D5F
                                                                  • Part of subcall function 00A48D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A48D75
                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A492C1
                                                                • _memcmp.LIBCMT ref: 00A492E4
                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A4931A
                                                                • HeapFree.KERNEL32(00000000), ref: 00A49321
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                • String ID:
                                                                • API String ID: 1592001646-0
                                                                • Opcode ID: 60a1eea6d0371b89930a8eb9684825b299d98057e069d44b992e13bddcf889c2
                                                                • Instruction ID: 6d44f1ef92dda7d7efa2133ef59e7917eba185177af9a9ed86f3d38f3014f1d8
                                                                • Opcode Fuzzy Hash: 60a1eea6d0371b89930a8eb9684825b299d98057e069d44b992e13bddcf889c2
                                                                • Instruction Fuzzy Hash: 8221AF32E40108EFDB10DFA4C949BEFB7B8FF85311F044059E894AB290D771AA15CB90
                                                                APIs
                                                                • GetWindowLongW.USER32(?,000000EC), ref: 00A763BD
                                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A763D7
                                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00A763E5
                                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00A763F3
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$Long$AttributesLayered
                                                                • String ID:
                                                                • API String ID: 2169480361-0
                                                                • Opcode ID: c49e89c8010c4f2d1beb9a35e9c827e4c3c8e6349c9ee38f902c14779024faca
                                                                • Instruction ID: 2e763d16e5df69f6204991b19855287676ceb62363f221829b34a12266b8c4d6
                                                                • Opcode Fuzzy Hash: c49e89c8010c4f2d1beb9a35e9c827e4c3c8e6349c9ee38f902c14779024faca
                                                                • Instruction Fuzzy Hash: 8211B631305914AFD704AB68DC45FBA77A9EF85320F18C119FA1ACB2D2CBB0AD01CB95
                                                                APIs
                                                                  • Part of subcall function 00A4F858: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00A4E46F,?,?,?,00A4F262,00000000,000000EF,00000119,?,?), ref: 00A4F867
                                                                  • Part of subcall function 00A4F858: lstrcpyW.KERNEL32(00000000,?,?,00A4E46F,?,?,?,00A4F262,00000000,000000EF,00000119,?,?,00000000), ref: 00A4F88D
                                                                  • Part of subcall function 00A4F858: lstrcmpiW.KERNEL32(00000000,?,00A4E46F,?,?,?,00A4F262,00000000,000000EF,00000119,?,?), ref: 00A4F8BE
                                                                • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00A4F262,00000000,000000EF,00000119,?,?,00000000), ref: 00A4E488
                                                                • lstrcpyW.KERNEL32(00000000,?,?,00A4F262,00000000,000000EF,00000119,?,?,00000000), ref: 00A4E4AE
                                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00A4F262,00000000,000000EF,00000119,?,?,00000000), ref: 00A4E4E2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: lstrcmpilstrcpylstrlen
                                                                • String ID: cdecl
                                                                • API String ID: 4031866154-3896280584
                                                                • Opcode ID: ce6575df54257308cf53690653361e8fa81400e5ceb76cdbf91b167b2f45d8ed
                                                                • Instruction ID: 894e9ce178e437401611a913244555a1d8f6efab814810b58a3b4ac3cb02c2c9
                                                                • Opcode Fuzzy Hash: ce6575df54257308cf53690653361e8fa81400e5ceb76cdbf91b167b2f45d8ed
                                                                • Instruction Fuzzy Hash: 6B11EF3A200345AFCB25EF74DC49D7A77B8FF85350B40402AF80ACB2A0EB719981C7A1
                                                                APIs
                                                                • _free.LIBCMT ref: 00A25331
                                                                  • Part of subcall function 00A1593C: __FF_MSGBANNER.LIBCMT ref: 00A15953
                                                                  • Part of subcall function 00A1593C: __NMSG_WRITE.LIBCMT ref: 00A1595A
                                                                  • Part of subcall function 00A1593C: RtlAllocateHeap.NTDLL(01010000,00000000,00000001,?,00000004,?,?,00A11003,?), ref: 00A1597F
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: AllocateHeap_free
                                                                • String ID:
                                                                • API String ID: 614378929-0
                                                                • Opcode ID: 8767c102f1e3ef597cfa021a50d6f38791f4b0d315a1b283cc3d242f2773a22b
                                                                • Instruction ID: afba45e17e5894f15bae941cb995f46674a1c75dc328c890ec231769fd1c0046
                                                                • Opcode Fuzzy Hash: 8767c102f1e3ef597cfa021a50d6f38791f4b0d315a1b283cc3d242f2773a22b
                                                                • Instruction Fuzzy Hash: 7E11A332D05B25AFCF24BFB8FD156DA3BA4BF143A0B205539F8589E1A1DE7489818790
                                                                APIs
                                                                • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00A54385
                                                                • _memset.LIBCMT ref: 00A543A6
                                                                • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00A543F8
                                                                • CloseHandle.KERNEL32(00000000), ref: 00A54401
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CloseControlCreateDeviceFileHandle_memset
                                                                • String ID:
                                                                • API String ID: 1157408455-0
                                                                • Opcode ID: d86eff26c13e25bb9587458e8d240957888fe1e6e71fb26ee1b4536aa7153aaa
                                                                • Instruction ID: fced22ce693dcd10de31572cceaad5afba64a4ba5ca42d357249e55a29374420
                                                                • Opcode Fuzzy Hash: d86eff26c13e25bb9587458e8d240957888fe1e6e71fb26ee1b4536aa7153aaa
                                                                • Instruction Fuzzy Hash: 90110D719013287AD7309BA5AC4DFEBBB7CEF44734F00459AF908D7190D2704E848BA4
                                                                APIs
                                                                  • Part of subcall function 00A0402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A57E51,?,?,00000000), ref: 00A04041
                                                                  • Part of subcall function 00A0402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A57E51,?,?,00000000,?,?), ref: 00A04065
                                                                • gethostbyname.WSOCK32(?,?,?), ref: 00A66A84
                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00A66A8F
                                                                • _memmove.LIBCMT ref: 00A66ABC
                                                                • inet_ntoa.WSOCK32(?), ref: 00A66AC7
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                • String ID:
                                                                • API String ID: 1504782959-0
                                                                • Opcode ID: 4587e825bb4b7175d521928fc0316b0c305530d46af834305edb28aa9bfacd86
                                                                • Instruction ID: 082be9c650cac11cbcadd49b033cc2601f0674ac41696c656a92a66455e79799
                                                                • Opcode Fuzzy Hash: 4587e825bb4b7175d521928fc0316b0c305530d46af834305edb28aa9bfacd86
                                                                • Instruction Fuzzy Hash: 80115476500108AFCB00EFE4DE86DEE77B8EF58310B144165F506A71A1DF309E14CB91
                                                                APIs
                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00A49719
                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A4972B
                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A49741
                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A4975C
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID:
                                                                • API String ID: 3850602802-0
                                                                • Opcode ID: 78693ff972220154b8564fcd3fb743e85632149dcc06eee395c551d981d88dfa
                                                                • Instruction ID: 3d0adf7d4fc3d95d6c1290aebecc620ff1ea763f4e4299cea3187342eb4c6c69
                                                                • Opcode Fuzzy Hash: 78693ff972220154b8564fcd3fb743e85632149dcc06eee395c551d981d88dfa
                                                                • Instruction Fuzzy Hash: 1E115A39900218FFEB10DF95CD84E9EBBB8FB48710F204091E900B7290D6716E21DB90
                                                                APIs
                                                                  • Part of subcall function 009F29E2: GetWindowLongW.USER32(?,000000EB), ref: 009F29F3
                                                                • DefDlgProcW.USER32(?,00000020,?), ref: 009F16B4
                                                                • GetClientRect.USER32(?,?), ref: 00A2B93C
                                                                • GetCursorPos.USER32(?), ref: 00A2B946
                                                                • ScreenToClient.USER32(?,?), ref: 00A2B951
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Client$CursorLongProcRectScreenWindow
                                                                • String ID:
                                                                • API String ID: 4127811313-0
                                                                • Opcode ID: 0b3fba40cc7c942294e9e81aedd78ee122d88c2300961da6dc26af0d46dbfa0a
                                                                • Instruction ID: 07729c5071a1c62877f54de19d17f526cb99b5910d213f99c45eb305f64ce04b
                                                                • Opcode Fuzzy Hash: 0b3fba40cc7c942294e9e81aedd78ee122d88c2300961da6dc26af0d46dbfa0a
                                                                • Instruction Fuzzy Hash: 46114336A0001DEBCB00EF98C885DBE77B8EB45301F504855EA41E7250C730BA92CBB1
                                                                APIs
                                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009F214F
                                                                • GetStockObject.GDI32(00000011), ref: 009F2163
                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 009F216D
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CreateMessageObjectSendStockWindow
                                                                • String ID:
                                                                • API String ID: 3970641297-0
                                                                • Opcode ID: 898845a3a257f40eed2ae823ac3d0a80e5a036bca02919cbf1f6e1f5550e5c02
                                                                • Instruction ID: 76d1f65c85b804047eabc5d8e052654528e2d51b7b758ccc1588734434207063
                                                                • Opcode Fuzzy Hash: 898845a3a257f40eed2ae823ac3d0a80e5a036bca02919cbf1f6e1f5550e5c02
                                                                • Instruction Fuzzy Hash: A611877220560DBFEB028FA09C84EEBBB6DEF583A4F050212FB1452020D7319C61EBA4
                                                                APIs
                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00A504EC,?,00A5153F,?,00008000), ref: 00A5195E
                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00A504EC,?,00A5153F,?,00008000), ref: 00A51983
                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00A504EC,?,00A5153F,?,00008000), ref: 00A5198D
                                                                • Sleep.KERNEL32(?,?,?,?,?,?,?,00A504EC,?,00A5153F,?,00008000), ref: 00A519C0
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CounterPerformanceQuerySleep
                                                                • String ID:
                                                                • API String ID: 2875609808-0
                                                                • Opcode ID: 6e3b81e4afeb58c20d76a32553630c0c68f16a488b74a65027f621f0b8f49a38
                                                                • Instruction ID: e83f8f4a2ecf61e8c6fffccee7ac83db62930cf9e57cc1c4e04223c23139a22d
                                                                • Opcode Fuzzy Hash: 6e3b81e4afeb58c20d76a32553630c0c68f16a488b74a65027f621f0b8f49a38
                                                                • Instruction Fuzzy Hash: 93113331C04629EBCF00DFE5D998BEEBBB8BF09752F004145E980B2241CB3096A98B91
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00A7E1EA
                                                                • LoadTypeLibEx.OLEAUT32(?,00000002,0000000C), ref: 00A7E201
                                                                • RegisterTypeLib.OLEAUT32(0000000C,?,00000000), ref: 00A7E216
                                                                • RegisterTypeLibForUser.OLEAUT32(0000000C,?,00000000), ref: 00A7E234
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Type$Register$FileLoadModuleNameUser
                                                                • String ID:
                                                                • API String ID: 1352324309-0
                                                                • Opcode ID: ec20053ecd7fb0483eca7d3ae058f8e12f7297cd4d9e075e91732ab0a63d3393
                                                                • Instruction ID: 129f59d9672936698f990bdb5ec438c66242381c3b4cc7c4d0ca538569d0cc10
                                                                • Opcode Fuzzy Hash: ec20053ecd7fb0483eca7d3ae058f8e12f7297cd4d9e075e91732ab0a63d3393
                                                                • Instruction Fuzzy Hash: 701152752453049BE730CF95DD08FD37BBCEB04B04F10C599A61AD6451D7B0E5089B91
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                • String ID:
                                                                • API String ID: 3016257755-0
                                                                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                • Instruction ID: fc8c9690b4a5bc94697b0a4c3699f2e6242966780ba43a98b9c8766181375d4b
                                                                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                • Instruction Fuzzy Hash: 0301953204815EFBCF125F88EC02CED3F22BB19340B448525FA1858131C736CAB1AB81
                                                                APIs
                                                                • GetWindowRect.USER32(?,?), ref: 00A7B956
                                                                • ScreenToClient.USER32(?,?), ref: 00A7B96E
                                                                • ScreenToClient.USER32(?,?), ref: 00A7B992
                                                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A7B9AD
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ClientRectScreen$InvalidateWindow
                                                                • String ID:
                                                                • API String ID: 357397906-0
                                                                • Opcode ID: c67c9febfd20e22cc230745b408dfa36ace04470df916ebd7b0ad04ab195646e
                                                                • Instruction ID: a9d56e711e43b63283fc96a0319e47fdb9fe715ae774a62d7d02778dcaaae4bb
                                                                • Opcode Fuzzy Hash: c67c9febfd20e22cc230745b408dfa36ace04470df916ebd7b0ad04ab195646e
                                                                • Instruction Fuzzy Hash: 891143B9D00209EFDB41CF98C984AEEBBF9FF48310F108166E914E3610E775AA658F50
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A7BCB6
                                                                • _memset.LIBCMT ref: 00A7BCC5
                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00AB8F20,00AB8F64), ref: 00A7BCF4
                                                                • CloseHandle.KERNEL32 ref: 00A7BD06
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: _memset$CloseCreateHandleProcess
                                                                • String ID:
                                                                • API String ID: 3277943733-0
                                                                • Opcode ID: 3529cb4f1ae99ec739343189ff19bc9ebf6f187b157f9e12c5736f24f6c03a98
                                                                • Instruction ID: b34632a10efa9e44966ffac923cd2595844d07fa6c21fab62c6bb8c958d0ae7c
                                                                • Opcode Fuzzy Hash: 3529cb4f1ae99ec739343189ff19bc9ebf6f187b157f9e12c5736f24f6c03a98
                                                                • Instruction Fuzzy Hash: B0F05EB26403047FE750AFB9AC05FFB3A5DEB08750F004521BA08D91A3DB798811C7A8
                                                                APIs
                                                                • EnterCriticalSection.KERNEL32(?), ref: 00A571A1
                                                                  • Part of subcall function 00A57C7F: _memset.LIBCMT ref: 00A57CB4
                                                                • _memmove.LIBCMT ref: 00A571C4
                                                                • _memset.LIBCMT ref: 00A571D1
                                                                • LeaveCriticalSection.KERNEL32(?), ref: 00A571E1
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                • String ID:
                                                                • API String ID: 48991266-0
                                                                • Opcode ID: 3311b978f910e193acc45f485d81a0724e668203ef686c336c4bdd3008188e95
                                                                • Instruction ID: d2cebf542e75ab197a7b2f42f5f4c7bc5a93ec2888fcd1826f5256c102b61e3d
                                                                • Opcode Fuzzy Hash: 3311b978f910e193acc45f485d81a0724e668203ef686c336c4bdd3008188e95
                                                                • Instruction Fuzzy Hash: 9BF0547A200100ABCF41AF55DD85E8ABB69FF49321F04C055FE085E21AC735E956DBB4
                                                                APIs
                                                                  • Part of subcall function 009F16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009F1729
                                                                  • Part of subcall function 009F16CF: SelectObject.GDI32(?,00000000), ref: 009F1738
                                                                  • Part of subcall function 009F16CF: BeginPath.GDI32(?), ref: 009F174F
                                                                  • Part of subcall function 009F16CF: SelectObject.GDI32(?,00000000), ref: 009F1778
                                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00A7C3E8
                                                                • LineTo.GDI32(00000000,?,?), ref: 00A7C3F5
                                                                • EndPath.GDI32(00000000), ref: 00A7C405
                                                                • StrokePath.GDI32(00000000), ref: 00A7C413
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                • String ID:
                                                                • API String ID: 1539411459-0
                                                                • Opcode ID: 36f6dfc4e58a9c21e80ec343549248c972560541c3c243264eb6a45ae1c5b665
                                                                • Instruction ID: 18f58284150e3ef9e8e3211271021ac3456a984873eb90702a8f3d3f7aae6775
                                                                • Opcode Fuzzy Hash: 36f6dfc4e58a9c21e80ec343549248c972560541c3c243264eb6a45ae1c5b665
                                                                • Instruction Fuzzy Hash: 74F0BE32045218BBDB12AFD0AC0DFDE3F69AF05321F048100FA11610E283B45556DBA9
                                                                APIs
                                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00A4AA6F
                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A4AA82
                                                                • GetCurrentThreadId.KERNEL32 ref: 00A4AA89
                                                                • AttachThreadInput.USER32(00000000), ref: 00A4AA90
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                • String ID:
                                                                • API String ID: 2710830443-0
                                                                • Opcode ID: d0a3e5e2c05ed9d27b09baa594298da832d1ecf1fa78bb260081274b1a3be03d
                                                                • Instruction ID: c0d85e61e428aefcc1530ae6c9e756fa7df852b03a1f3d0e4e3f394bfe0c3423
                                                                • Opcode Fuzzy Hash: d0a3e5e2c05ed9d27b09baa594298da832d1ecf1fa78bb260081274b1a3be03d
                                                                • Instruction Fuzzy Hash: 3EE03936581228BADB619FE29D0CEE77F1CEF617A1F008021F50984050D7B1C555CBA0
                                                                APIs
                                                                • GetSysColor.USER32(00000008), ref: 009F260D
                                                                • SetTextColor.GDI32(?,000000FF), ref: 009F2617
                                                                • SetBkMode.GDI32(?,00000001), ref: 009F262C
                                                                • GetStockObject.GDI32(00000005), ref: 009F2634
                                                                • GetWindowDC.USER32(?,00000000), ref: 00A2C1C4
                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A2C1D1
                                                                • GetPixel.GDI32(00000000,?,00000000), ref: 00A2C1EA
                                                                • GetPixel.GDI32(00000000,00000000,?), ref: 00A2C203
                                                                • GetPixel.GDI32(00000000,?,?), ref: 00A2C223
                                                                • ReleaseDC.USER32(?,00000000), ref: 00A2C22E
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                • String ID:
                                                                • API String ID: 1946975507-0
                                                                • Opcode ID: 3c1afa76a61becceb6ae4889555558eba605ccc6c5c61e6ed76177b664f24eee
                                                                • Instruction ID: 3d0303f17310e73500b59632f829088d1377bc63f6130373afc6127057ebf16e
                                                                • Opcode Fuzzy Hash: 3c1afa76a61becceb6ae4889555558eba605ccc6c5c61e6ed76177b664f24eee
                                                                • Instruction Fuzzy Hash: E8E06D32504248BFEB619FA8BC4DBE83B11EB15332F048366FA69880E187714A95DB21
                                                                APIs
                                                                • GetCurrentThread.KERNEL32 ref: 00A49339
                                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A48F04), ref: 00A49340
                                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A48F04), ref: 00A4934D
                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A48F04), ref: 00A49354
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CurrentOpenProcessThreadToken
                                                                • String ID:
                                                                • API String ID: 3974789173-0
                                                                • Opcode ID: f8c2728d819eaf404cb16839bd1ee41939cd4ad7b8299194a8a24533596d4067
                                                                • Instruction ID: 40012575be25f511024bb6bb2699618c269de972d0a09fc0f3e5155f661b3f40
                                                                • Opcode Fuzzy Hash: f8c2728d819eaf404cb16839bd1ee41939cd4ad7b8299194a8a24533596d4067
                                                                • Instruction Fuzzy Hash: 98E086366012119FD7A09FF15D0DF573B7CEF51791F114818B245CD090E634A44AC750
                                                                APIs
                                                                • GetDesktopWindow.USER32 ref: 00A30679
                                                                • GetDC.USER32(00000000), ref: 00A30683
                                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A306A3
                                                                • ReleaseDC.USER32(?), ref: 00A306C4
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                                • String ID:
                                                                • API String ID: 2889604237-0
                                                                • Opcode ID: 49dcc5548ad46b9ddc3d82054a56cfba361080212f3a81f64b559294162b4bef
                                                                • Instruction ID: c1be19908a9d117b24cdf0fb5258fde00de61509385ce658dfebeaa867db2ba5
                                                                • Opcode Fuzzy Hash: 49dcc5548ad46b9ddc3d82054a56cfba361080212f3a81f64b559294162b4bef
                                                                • Instruction Fuzzy Hash: ACE0E572800204EFCB819FA0D808A6DBBB5AF88311F118425F95AA7250EBB895569F50
                                                                APIs
                                                                • GetDesktopWindow.USER32 ref: 00A3068D
                                                                • GetDC.USER32(00000000), ref: 00A30697
                                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A306A3
                                                                • ReleaseDC.USER32(?), ref: 00A306C4
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                                • String ID:
                                                                • API String ID: 2889604237-0
                                                                • Opcode ID: ee6a5c4d2fb87c3674df1d0d2ed3f61ab00258e0520bc538cbaac15eee3cf3e3
                                                                • Instruction ID: a3a02d28c02e799b0a84689c5dd400cc60e8aeea3b042014d0a9d46fb73c7d59
                                                                • Opcode Fuzzy Hash: ee6a5c4d2fb87c3674df1d0d2ed3f61ab00258e0520bc538cbaac15eee3cf3e3
                                                                • Instruction Fuzzy Hash: EEE01A72800204AFCB819FA0D808A6DBFF1BF8C311F108424FA59A7250EB7895568F50
                                                                APIs
                                                                • OleSetContainedObject.OLE32(?,00000001), ref: 00A4C057
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ContainedObject
                                                                • String ID: AutoIt3GUI$Container
                                                                • API String ID: 3565006973-3941886329
                                                                • Opcode ID: d0da5c2bb89469b700f3dd0869382c2685bdc37d0eda383a479ef63ca9b3304a
                                                                • Instruction ID: 88918a885ce9069f7cd1c06bef1ed29a942aa0f949c9bdd0238242d660039fd1
                                                                • Opcode Fuzzy Hash: d0da5c2bb89469b700f3dd0869382c2685bdc37d0eda383a479ef63ca9b3304a
                                                                • Instruction Fuzzy Hash: 69914A74600201EFDB54DF68C884A6ABBF5FF89710F10856DF94ACB691DBB1E845CB60
                                                                APIs
                                                                  • Part of subcall function 00A0436A: _wcscpy.LIBCMT ref: 00A0438D
                                                                  • Part of subcall function 009F4D37: __itow.LIBCMT ref: 009F4D62
                                                                  • Part of subcall function 009F4D37: __swprintf.LIBCMT ref: 009F4DAC
                                                                • __wcsnicmp.LIBCMT ref: 00A5B670
                                                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00A5B739
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                • String ID: LPT
                                                                • API String ID: 3222508074-1350329615
                                                                • Opcode ID: cb93f151878453369bed8a1a03a96a948cac0da3cc3d6ce1d365001471e58718
                                                                • Instruction ID: 81e9e99a87b9780acb0c90c792c0030cf83a6e1f026382ad465d84e639a6ed37
                                                                • Opcode Fuzzy Hash: cb93f151878453369bed8a1a03a96a948cac0da3cc3d6ce1d365001471e58718
                                                                • Instruction Fuzzy Hash: 28616F75A10219EFCB14DF98C891EAEB7B4FF48311F108159F906AB391DB70AE44CBA0
                                                                APIs
                                                                • Sleep.KERNEL32(00000000), ref: 009FE01E
                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 009FE037
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: GlobalMemorySleepStatus
                                                                • String ID: @
                                                                • API String ID: 2783356886-2766056989
                                                                • Opcode ID: 6c938b97fed11fd1452b3b20a9b7c30efbab666c6d08c706c741cf2ba306afe1
                                                                • Instruction ID: 88ebd400344d9303c2d6a77e33417b835df76f96c78d4b48c0a9984f2bcaf7f3
                                                                • Opcode Fuzzy Hash: 6c938b97fed11fd1452b3b20a9b7c30efbab666c6d08c706c741cf2ba306afe1
                                                                • Instruction Fuzzy Hash: 4B5148725087489BE320AF50EC86BAFBBF8FBC4314F51484DF2D8411A1EB709529CB16
                                                                APIs
                                                                • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00A78186
                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A7819B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID: '
                                                                • API String ID: 3850602802-1997036262
                                                                • Opcode ID: c3369ea35951daf1d385e67c92e0378ec95fd08177067a5edc17cc454a68736e
                                                                • Instruction ID: d1c3cbc5c69cfdb1f379649b859b2997667b4a38f8a3264ec92b61a24afcc846
                                                                • Opcode Fuzzy Hash: c3369ea35951daf1d385e67c92e0378ec95fd08177067a5edc17cc454a68736e
                                                                • Instruction Fuzzy Hash: 18412A74A412099FDB10CF68CC85BDA7BB5FF08300F50816AE908AB351DB75A956CF90
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A62C6A
                                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00A62CA0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CrackInternet_memset
                                                                • String ID: |
                                                                • API String ID: 1413715105-2343686810
                                                                • Opcode ID: de0a2da120dc8417d077f4a3159012587b0efdb21dd266c3cb0f5b99b51023b7
                                                                • Instruction ID: 72e7337d962b2840aca10fd1cf0984584c3e5dfbaa4cdb56a58711634c81b8c6
                                                                • Opcode Fuzzy Hash: de0a2da120dc8417d077f4a3159012587b0efdb21dd266c3cb0f5b99b51023b7
                                                                • Instruction Fuzzy Hash: BB313C71C00119EBCF01EFA1DD85AEEBFB9FF08300F104019F915AA162EB319956DBA0
                                                                APIs
                                                                • DestroyWindow.USER32(?,?,?,?), ref: 00A7713C
                                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00A77178
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$DestroyMove
                                                                • String ID: static
                                                                • API String ID: 2139405536-2160076837
                                                                • Opcode ID: 7a990fa3ea11312b5386004f339365f5008813559460c244b41df00307e53155
                                                                • Instruction ID: ede77fc06d22cd0de1188509e28bcde024925742e720e886ff4883b4c363ee71
                                                                • Opcode Fuzzy Hash: 7a990fa3ea11312b5386004f339365f5008813559460c244b41df00307e53155
                                                                • Instruction Fuzzy Hash: A9317E71110604AAEB11DF74CC80FFB77A9FF88724F10D619F999971A1DA31AC81CB60
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A530B8
                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A530F3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: InfoItemMenu_memset
                                                                • String ID: 0
                                                                • API String ID: 2223754486-4108050209
                                                                • Opcode ID: e2472debc69aef1b1561bf56ea25500e002b3a8bf94b9c30aca6438c81b23c86
                                                                • Instruction ID: fce0286c40f02400de6a7d466d164b029a22e0f86b762ee263e304c37f810b28
                                                                • Opcode Fuzzy Hash: e2472debc69aef1b1561bf56ea25500e002b3a8bf94b9c30aca6438c81b23c86
                                                                • Instruction Fuzzy Hash: C731E333600205ABEF248F68C985BEEBBB8FB853C1F144119ED81A61A1D7709B48CB50
                                                                APIs
                                                                • __snwprintf.LIBCMT ref: 00A64132
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __snwprintf_memmove
                                                                • String ID: , $$AUTOITCALLVARIABLE%d
                                                                • API String ID: 3506404897-2584243854
                                                                • Opcode ID: a706802ee7ac3968110481329d7cbc86fa18b9029cb0ee94f05a063545d8d71c
                                                                • Instruction ID: 6339b84b857920ee3384a72fe74249e9e880a4e6798dd3950f7e13b699dc4456
                                                                • Opcode Fuzzy Hash: a706802ee7ac3968110481329d7cbc86fa18b9029cb0ee94f05a063545d8d71c
                                                                • Instruction Fuzzy Hash: E0218C70A0021CAFCF15EFA4D982AEE77B5EF5A340F004455F905A7282DB70AA85CBA1
                                                                APIs
                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A76D86
                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A76D91
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: MessageSend
                                                                • String ID: Combobox
                                                                • API String ID: 3850602802-2096851135
                                                                • Opcode ID: 73a294d1f94ab0c1e5c81be6c9f4fbff85a6601cece4fe29d4f92912ca30e235
                                                                • Instruction ID: 0e69f3b3d2b6db735b5bdd801dc54dd37ff25c60812b0df3596b78ac70ec0af9
                                                                • Opcode Fuzzy Hash: 73a294d1f94ab0c1e5c81be6c9f4fbff85a6601cece4fe29d4f92912ca30e235
                                                                • Instruction Fuzzy Hash: 13118271320A08BFEF619F54DC81FFB3B6AEB88364F11C125F9189B291D6719C518760
                                                                APIs
                                                                  • Part of subcall function 009F2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009F214F
                                                                  • Part of subcall function 009F2111: GetStockObject.GDI32(00000011), ref: 009F2163
                                                                  • Part of subcall function 009F2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 009F216D
                                                                • GetWindowRect.USER32(00000000,?), ref: 00A77296
                                                                • GetSysColor.USER32(00000012), ref: 00A772B0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                • String ID: static
                                                                • API String ID: 1983116058-2160076837
                                                                • Opcode ID: 71c2716b950880c54b3706bface6c302b868a7be85007fcfc7f2dd2a3f3ccb4b
                                                                • Instruction ID: 67e3a6e11658370ab119a74a33c89c7eaec83f73c9ef948fb351dacc364e3706
                                                                • Opcode Fuzzy Hash: 71c2716b950880c54b3706bface6c302b868a7be85007fcfc7f2dd2a3f3ccb4b
                                                                • Instruction Fuzzy Hash: BC21177261420AAFDB04DFA8CC45EFE7BA8EB48314F008618FD59D3251E635A8519BA0
                                                                APIs
                                                                • GetWindowTextLengthW.USER32(00000000), ref: 00A76FC7
                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00A76FD6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: LengthMessageSendTextWindow
                                                                • String ID: edit
                                                                • API String ID: 2978978980-2167791130
                                                                • Opcode ID: 2f27a4c1f4628596c18e2a81961a3a4b03cc2e2b152041ad891d264c599b7424
                                                                • Instruction ID: f1bd08f0824fab0d4d68ae786e2b09c670596d4bbcc7435ad26dbbbcddb8afc0
                                                                • Opcode Fuzzy Hash: 2f27a4c1f4628596c18e2a81961a3a4b03cc2e2b152041ad891d264c599b7424
                                                                • Instruction Fuzzy Hash: 7C116A71100608ABEB509F64EC90FFB3B6AEB04368F10C724F968971E0C772DC919B60
                                                                APIs
                                                                • _memset.LIBCMT ref: 00A531C9
                                                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00A531E8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: InfoItemMenu_memset
                                                                • String ID: 0
                                                                • API String ID: 2223754486-4108050209
                                                                • Opcode ID: 4376ce983d944f1155ff0e06a17204c0a841b6ba7c1ca20ddca9c457d960dc94
                                                                • Instruction ID: 9b313a418044c7e03cb1b2cabbf3ffbf409b3e3116a67e77210d24f9d1c5fd30
                                                                • Opcode Fuzzy Hash: 4376ce983d944f1155ff0e06a17204c0a841b6ba7c1ca20ddca9c457d960dc94
                                                                • Instruction Fuzzy Hash: 1A11D033900514ABDF20DBA8DC45BAD77B8BB85392F144225EC06A72A0D770AF09CBA1
                                                                APIs
                                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00A628F8
                                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00A62921
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Internet$OpenOption
                                                                • String ID: <local>
                                                                • API String ID: 942729171-4266983199
                                                                • Opcode ID: ba4819f41ad004b19f4df7e32f8e16b5de7892a55e8a9e086dfa0ca0c2465f4e
                                                                • Instruction ID: 31d34c1efdd03178d263947cca6f3331f1f743e3d3e7388ddd8ff81ae332191f
                                                                • Opcode Fuzzy Hash: ba4819f41ad004b19f4df7e32f8e16b5de7892a55e8a9e086dfa0ca0c2465f4e
                                                                • Instruction Fuzzy Hash: 8A11CE71501A25BAEB248B518C88FBBBBB8FF06791F10812AF54547100E3706894D7E0
                                                                APIs
                                                                  • Part of subcall function 00A686E0: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00A6849D,?,00000000,?,?), ref: 00A686F7
                                                                • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A684A0
                                                                • htons.WSOCK32(00000000,?,00000000), ref: 00A684DD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWidehtonsinet_addr
                                                                • String ID: 255.255.255.255
                                                                • API String ID: 2496851823-2422070025
                                                                • Opcode ID: 54518ffb05efae90e062019ead69a3ea37ef9e8dba8c1b7a53b3ec05aa2983ed
                                                                • Instruction ID: ae99fd3b0fddef4ab7546c49778ba1219878f113bbd8d5e9127681ae52100a2f
                                                                • Opcode Fuzzy Hash: 54518ffb05efae90e062019ead69a3ea37ef9e8dba8c1b7a53b3ec05aa2983ed
                                                                • Instruction Fuzzy Hash: 7811827510020AABDB10EF64D94AFAEB338FF44710F10462AF915572D1DF71A814C755
                                                                APIs
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                  • Part of subcall function 00A4B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B7BD
                                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A49A2B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ClassMessageNameSend_memmove
                                                                • String ID: ComboBox$ListBox
                                                                • API String ID: 372448540-1403004172
                                                                • Opcode ID: 35e04df8c05674f99a0d8ef474efc5a6bc15d22e211b48300e1f21216b3130db
                                                                • Instruction ID: ef32a31de5641976225bca35af3ada4d85daf9a888954ecbc9c863dc484b5c8a
                                                                • Opcode Fuzzy Hash: 35e04df8c05674f99a0d8ef474efc5a6bc15d22e211b48300e1f21216b3130db
                                                                • Instruction Fuzzy Hash: 0A01F575A42118ABCB14EBA4CD91CFF73A9AF92360B100619F861532C1EB305818C660
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: __fread_nolock_memmove
                                                                • String ID: EA06
                                                                • API String ID: 1988441806-3962188686
                                                                • Opcode ID: b4d1e185883ac79b823be68ee73e4057c2edd435da52faa1f39165a2186a8f59
                                                                • Instruction ID: b156f0f19b1584551029a4b7a6d577639ef7d94e094551cc5dd2b0369e2f0bca
                                                                • Opcode Fuzzy Hash: b4d1e185883ac79b823be68ee73e4057c2edd435da52faa1f39165a2186a8f59
                                                                • Instruction Fuzzy Hash: 4501F972C04258BEDB18C7A8C856EFE7BF89B05311F00419EF592D6181E574A6088760
                                                                APIs
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                  • Part of subcall function 00A4B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B7BD
                                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A49923
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ClassMessageNameSend_memmove
                                                                • String ID: ComboBox$ListBox
                                                                • API String ID: 372448540-1403004172
                                                                • Opcode ID: fb7776cf2f9d734613e84779557f448b524a3100ff801b46cc65f472b6eaf344
                                                                • Instruction ID: a0eb008bf9dac1bcbffb7a3585c7f38b010ef2b5e087ea352ddeb4128fb43933
                                                                • Opcode Fuzzy Hash: fb7776cf2f9d734613e84779557f448b524a3100ff801b46cc65f472b6eaf344
                                                                • Instruction Fuzzy Hash: 6C01DB75E421097BDB14EBA0DA52EFF73EC9F55340F100119B841632D2DB109E18D6B1
                                                                APIs
                                                                  • Part of subcall function 00A01A36: _memmove.LIBCMT ref: 00A01A77
                                                                  • Part of subcall function 00A4B79A: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B7BD
                                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00A499A6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ClassMessageNameSend_memmove
                                                                • String ID: ComboBox$ListBox
                                                                • API String ID: 372448540-1403004172
                                                                • Opcode ID: b5ddd253e1464f660294a4bd89e437f8564ad1ef0664c08dbec4963c2e249481
                                                                • Instruction ID: 43556a05985ae3f4ce1cbf855c3d4cddf3e0c2e403e1a692b2e5aa66241e4d23
                                                                • Opcode Fuzzy Hash: b5ddd253e1464f660294a4bd89e437f8564ad1ef0664c08dbec4963c2e249481
                                                                • Instruction Fuzzy Hash: 4501DB76E421097BDB14EBA4CB52EFF73AC9F51340F100019B845632D2DB158E189671
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: ClassName_wcscmp
                                                                • String ID: #32770
                                                                • API String ID: 2292705959-463685578
                                                                • Opcode ID: af2a13edac34221940b3a9a5635725d96542a604135af16e212953f4142bf806
                                                                • Instruction ID: b0c51e5ead25f4841f13eee05864c676e9c0883ed0cec9b04dbffb4ea055ec3e
                                                                • Opcode Fuzzy Hash: af2a13edac34221940b3a9a5635725d96542a604135af16e212953f4142bf806
                                                                • Instruction Fuzzy Hash: A0E09B7250022927D720EA99AC49FA7F7ACEB55761F000157BD04D7051E660A94987E0
                                                                APIs
                                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00A488A0
                                                                  • Part of subcall function 00A13588: _doexit.LIBCMT ref: 00A13592
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Message_doexit
                                                                • String ID: AutoIt$Error allocating memory.
                                                                • API String ID: 1993061046-4017498283
                                                                • Opcode ID: 8e6f18e01fc7428ea1a30063d8f910ae241590bbcc9cff21c04359adac15c8ac
                                                                • Instruction ID: 7b56f8a8d33e7585da12d04c7c8dcb2417bada1aa3da74d1c6506e6ee88c9fb3
                                                                • Opcode Fuzzy Hash: 8e6f18e01fc7428ea1a30063d8f910ae241590bbcc9cff21c04359adac15c8ac
                                                                • Instruction Fuzzy Hash: B4D05B7238535836D25576E47E1BFDA7B489F09B51F004426FB08651C34AD585D183D5
                                                                APIs
                                                                  • Part of subcall function 00A2B544: _memset.LIBCMT ref: 00A2B551
                                                                  • Part of subcall function 00A10B74: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00A2B520,?,?,?,009F100A), ref: 00A10B79
                                                                • IsDebuggerPresent.KERNEL32(?,?,?,009F100A), ref: 00A2B524
                                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,009F100A), ref: 00A2B533
                                                                Strings
                                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00A2B52E
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                • API String ID: 3158253471-631824599
                                                                • Opcode ID: e629cf79fac314ae4b5a47553bfcd5f036ef4d199c84d31bf8d04f5367f20b7b
                                                                • Instruction ID: 63921377fffdecb32caa5b4fdaf40d321dea4ede20df528aad0bd1477d053a55
                                                                • Opcode Fuzzy Hash: e629cf79fac314ae4b5a47553bfcd5f036ef4d199c84d31bf8d04f5367f20b7b
                                                                • Instruction Fuzzy Hash: 38E06D702147218FD770DF69E904B867BF4AF04304F04892DE896CA341EBB4D548CBA1
                                                                APIs
                                                                • GetSystemDirectoryW.KERNEL32(?), ref: 00A30091
                                                                  • Part of subcall function 00A6C6D9: LoadLibraryA.KERNEL32(kernel32.dll,?,00A3027A,?), ref: 00A6C6E7
                                                                  • Part of subcall function 00A6C6D9: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00A6C6F9
                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00A30289
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                                • String ID: WIN_XPe
                                                                • API String ID: 582185067-3257408948
                                                                • Opcode ID: ad356bfa5bdf0e5a063dccc24d56e8ea97b67255b6089620ffe53a5d8b1e9aae
                                                                • Instruction ID: ea208a88675ab201a7b5333148f3b24babacbfc1853a76e072eb53e551b60e84
                                                                • Opcode Fuzzy Hash: ad356bfa5bdf0e5a063dccc24d56e8ea97b67255b6089620ffe53a5d8b1e9aae
                                                                • Instruction Fuzzy Hash: 90F0C971805109DFCB69DBA4C9A8FEDBBB8AB09304F241485F146B21A0CB755F85DF21
                                                                APIs
                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 00A59EB5
                                                                • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00A59ECC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000A.00000002.2690890803.00000000009F1000.00000020.00000001.01000000.00000007.sdmp, Offset: 009F0000, based on PE: true
                                                                • Associated: 0000000A.00000002.2690874240.00000000009F0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000A80000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2690939963.0000000000AA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691001317.0000000000AB0000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                • Associated: 0000000A.00000002.2691020753.0000000000AB9000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_10_2_9f0000_Introduces.jbxd
                                                                Similarity
                                                                • API ID: Temp$FileNamePath
                                                                • String ID: aut
                                                                • API String ID: 3285503233-3010740371
                                                                • Opcode ID: 7cd8e6de1bb9f20f97fcbff6ad87d9a5efbedb4639867299e7b388d19d02cf39
                                                                • Instruction ID: b14ad8e80caa8da8968459a9dc4a055e64b4bc83ef1a19cec29f112273695561
                                                                • Opcode Fuzzy Hash: 7cd8e6de1bb9f20f97fcbff6ad87d9a5efbedb4639867299e7b388d19d02cf39
                                                                • Instruction Fuzzy Hash: F8D05E7554030DBBDB90EBD0DC0EFDABB2CEB04700F0042A1BF58920A2EAB055998BA1