Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vwZcJ81cpN.exe

Overview

General Information

Sample name:vwZcJ81cpN.exe
renamed because original name is a hash value
Original sample name:8d647e31e2e4241606104564b0efa364.exe
Analysis ID:1579793
MD5:8d647e31e2e4241606104564b0efa364
SHA1:427e9cd7cfb80db43c21187117c927397f21e774
SHA256:08b3976cf68e5714f6bded88a0aea5820946e94bdab8f88bf9c2792d51d21169
Tags:exeuser-abuse_ch
Infos:

Detection

Socks5Systemz
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Socks5Systemz
AI detected suspicious sample
Contains functionality to infect the boot sector
Found API chain indicative of debugger detection
Machine Learning detection for dropped file
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • vwZcJ81cpN.exe (PID: 3228 cmdline: "C:\Users\user\Desktop\vwZcJ81cpN.exe" MD5: 8D647E31E2E4241606104564B0EFA364)
    • vwZcJ81cpN.tmp (PID: 5284 cmdline: "C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp" /SL5="$20436,3102839,56832,C:\Users\user\Desktop\vwZcJ81cpN.exe" MD5: 397E7773A205B3947EEE196EA2F624B9)
      • megasoftdivxconverter.exe (PID: 6540 cmdline: "C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe" -i MD5: 8FB49FA4DAF45523188E06A18EB4B95A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\ProgramData\DivXConverter\DivXConverter.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-303L9.tmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        SourceRuleDescriptionAuthorStrings
        00000003.00000000.2081108868.0000000000401000.00000020.00000001.01000000.00000009.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          00000003.00000002.3932286201.0000000002CD1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
            00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
              Process Memory Space: megasoftdivxconverter.exe PID: 6540JoeSecurity_Socks5SystemzYara detected Socks5SystemzJoe Security
                SourceRuleDescriptionAuthorStrings
                3.0.megasoftdivxconverter.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
                  No Sigma rule has matched
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-23T09:23:02.315472+010020287653Unknown Traffic192.168.2.549954188.119.66.185443TCP
                  2024-12-23T09:24:04.653792+010020287653Unknown Traffic192.168.2.549977188.119.66.185443TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2024-12-23T09:23:02.996132+010028032742Potentially Bad Traffic192.168.2.549954188.119.66.185443TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\ProgramData\DivXConverter\DivXConverter.exeReversingLabs: Detection: 52%
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeReversingLabs: Detection: 52%
                  Source: vwZcJ81cpN.exeReversingLabs: Detection: 42%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeJoe Sandbox ML: detected
                  Source: C:\ProgramData\DivXConverter\DivXConverter.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045D188 GetProcAddress,GetProcAddress,GetProcAddress,ISCryptGetVersion,1_2_0045D188
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045D254 ArcFourCrypt,1_2_0045D254
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045D23C ArcFourCrypt,1_2_0045D23C
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_10001000 ISCryptGetVersion,1_2_10001000
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_10001130 ArcFourCrypt,1_2_10001130

                  Compliance

                  barindex
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeUnpacked PE file: 3.2.megasoftdivxconverter.exe.400000.0.unpack
                  Source: vwZcJ81cpN.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DivX Converter_is1Jump to behavior
                  Source: unknownHTTPS traffic detected: 188.119.66.185:443 -> 192.168.2.5:49954 version: TLS 1.2
                  Source: Binary string: msvcp71.pdbx# source: is-HE37O.tmp.1.dr
                  Source: Binary string: msvcr71.pdb< source: is-DRJIL.tmp.1.dr
                  Source: Binary string: msvcp71.pdb source: is-HE37O.tmp.1.dr
                  Source: Binary string: MicrosoftWindowsGdiPlus-1.0.2600.1360-gdiplus.pdb source: is-6VN1H.tmp.1.dr
                  Source: Binary string: msvcr71.pdb source: is-DRJIL.tmp.1.dr
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
                  Source: Joe Sandbox ViewIP Address: 188.119.66.185 188.119.66.185
                  Source: Joe Sandbox ViewJA3 fingerprint: 51c64c77e60f3980eea90869b68c58a8
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49954 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.5:49977 -> 188.119.66.185:443
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49954 -> 188.119.66.185:443
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d005633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a201bd23184 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: unknownTCP traffic detected without corresponding DNS query: 188.119.66.185
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_00A3EA5C InternetReadFile,3_2_00A3EA5C
                  Source: global trafficHTTP traffic detected: GET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d005633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a201bd23184 HTTP/1.1User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)Host: 188.119.66.185
                  Source: vwZcJ81cpN.tmp, vwZcJ81cpN.tmp, 00000001.00000000.2069274246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, vwZcJ81cpN.tmp.0.dr, is-FNEE7.tmp.1.drString found in binary or memory: http://www.innosetup.com/
                  Source: vwZcJ81cpN.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdline
                  Source: vwZcJ81cpN.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
                  Source: vwZcJ81cpN.exe, 00000000.00000003.2068834520.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.2068685370.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, vwZcJ81cpN.tmp, 00000001.00000000.2069274246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, vwZcJ81cpN.tmp.0.dr, is-FNEE7.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
                  Source: vwZcJ81cpN.exe, 00000000.00000003.2068834520.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.2068685370.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000000.2069274246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, vwZcJ81cpN.tmp.0.dr, is-FNEE7.tmp.1.drString found in binary or memory: http://www.remobjects.com/psU
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000990000.00000004.00000020.00020000.00000000.sdmp, megasoftdivxconverter.exe, 00000003.00000002.3932565761.0000000003378000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3932565761.0000000003378000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/7
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000972000.00000004.00000020.00020000.00000000.sdmp, megasoftdivxconverter.exe, 00000003.00000002.3931052614.00000000009A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b325
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/allowedCert_OS_1
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/en-GB
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/priseCertificates
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000990000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://188.119.66.185/rosoft
                  Source: vwZcJ81cpN.exe, 00000000.00000003.2068038906.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.2068117274.00000000020A1000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000002.3930749062.00000000020A1000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000003.2070166188.00000000021A8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000002.3930848443.0000000000679000.00000004.00000020.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000002.3931022765.00000000021A8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000003.2070069699.0000000003120000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.easycutstudio.com/support.html
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49954 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49954
                  Source: unknownHTTPS traffic detected: 188.119.66.185:443 -> 192.168.2.5:49954 version: TLS 1.2
                  Source: is-6VN1H.tmp.1.drBinary or memory string: DirectDrawCreateExmemstr_a9ce24fd-e
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0042F520 NtdllDefWindowProc_A,1_2_0042F520
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00423B84 NtdllDefWindowProc_A,1_2_00423B84
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004125D8 NtdllDefWindowProc_A,1_2_004125D8
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00478AC0 NtdllDefWindowProc_A,1_2_00478AC0
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00457594 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,1_2_00457594
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0042E934: CreateFileA,DeviceIoControl,GetLastError,CloseHandle,SetLastError,1_2_0042E934
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_0040840C0_2_0040840C
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004706A81_2_004706A8
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004809F71_2_004809F7
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004352C81_2_004352C8
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004673A41_2_004673A4
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0043DD501_2_0043DD50
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0043035C1_2_0043035C
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004444C81_2_004444C8
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004345C41_2_004345C4
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00444A701_2_00444A70
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00486BD01_2_00486BD0
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00430EE81_2_00430EE8
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045F0C41_2_0045F0C4
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004451681_2_00445168
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045B1741_2_0045B174
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004694041_2_00469404
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004455741_2_00445574
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004519BC1_2_004519BC
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00487B301_2_00487B30
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0048DF541_2_0048DF54
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_004010003_2_00401000
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_004067B73_2_004067B7
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609660FA3_2_609660FA
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6092114F3_2_6092114F
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6091F2C93_2_6091F2C9
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096923E3_2_6096923E
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6093323D3_2_6093323D
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095C3143_2_6095C314
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609503123_2_60950312
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094D33B3_2_6094D33B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6093B3683_2_6093B368
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096748C3_2_6096748C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6093F42E3_2_6093F42E
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609544703_2_60954470
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609615FA3_2_609615FA
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096A5EE3_2_6096A5EE
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096D6A43_2_6096D6A4
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609606A83_2_609606A8
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609326543_2_60932654
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609556653_2_60955665
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094B7DB3_2_6094B7DB
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6092F74D3_2_6092F74D
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609648073_2_60964807
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094E9BC3_2_6094E9BC
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609379293_2_60937929
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6093FAD63_2_6093FAD6
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096DAE83_2_6096DAE8
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094DA3A3_2_6094DA3A
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60936B273_2_60936B27
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60954CF63_2_60954CF6
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60950C6B3_2_60950C6B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60966DF13_2_60966DF1
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60963D353_2_60963D35
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60909E9C3_2_60909E9C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60951E863_2_60951E86
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60912E0B3_2_60912E0B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60954FF83_2_60954FF8
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009E94B33_2_009E94B3
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009C70B03_2_009C70B0
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009BE0793_2_009BE079
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009CBAED3_2_009CBAED
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009D2A703_2_009D2A70
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009CD31F3_2_009CD31F
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009D0DA43_2_009D0DA4
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009CB5F93_2_009CB5F9
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009D266D3_2_009D266D
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009CBF053_2_009CBF05
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009C873A3_2_009C873A
                  Source: Joe Sandbox ViewDropped File: C:\ProgramData\DivXConverter\sqlite3.dll 16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 00408C0C appears 45 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 00406AC4 appears 43 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 0040595C appears 117 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 00457F1C appears 73 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 00403400 appears 60 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 00445DD4 appears 45 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 00457D10 appears 96 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 004344DC appears 32 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 004078F4 appears 43 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 00403494 appears 83 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 00403684 appears 225 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 00453344 appears 97 times
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: String function: 004460A4 appears 59 times
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: String function: 009D2A00 appears 135 times
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: String function: 009C7750 appears 32 times
                  Source: vwZcJ81cpN.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                  Source: vwZcJ81cpN.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Source: vwZcJ81cpN.tmp.0.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
                  Source: is-FNEE7.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
                  Source: is-FNEE7.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                  Source: is-FNEE7.tmp.1.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
                  Source: DivXConverter.exe.3.drStatic PE information: Resource name: RT_STRING type: DOS executable (COM, 0x8C-variant)
                  Source: sqlite3.dll.3.drStatic PE information: Number of sections : 19 > 10
                  Source: is-UTFL3.tmp.1.drStatic PE information: Number of sections : 19 > 10
                  Source: vwZcJ81cpN.exe, 00000000.00000003.2068834520.00000000020A8000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs vwZcJ81cpN.exe
                  Source: vwZcJ81cpN.exe, 00000000.00000003.2068685370.00000000023B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs vwZcJ81cpN.exe
                  Source: vwZcJ81cpN.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                  Source: classification engineClassification label: mal96.troj.evad.winEXE@5/26@0/1
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009BF8C0 _memset,FormatMessageA,GetLastError,FormatMessageA,GetLastError,3_2_009BF8C0
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00409448 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_00409448
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004555E4 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,1_2_004555E4
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00455E0C GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,1_2_00455E0C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: CreateServiceA,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_00401E0D
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0046E0E4 GetVersion,CoCreateInstance,1_2_0046E0E4
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00409C34 FindResourceA,SizeofResource,LoadResource,LockResource,0_2_00409C34
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_0040195C StartServiceCtrlDispatcherA,3_2_0040195C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_0040195C StartServiceCtrlDispatcherA,3_2_0040195C
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeFile created: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmpJump to behavior
                  Source: Yara matchFile source: 3.0.megasoftdivxconverter.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000000.2081108868.0000000000401000.00000020.00000001.01000000.00000009.sdmp, type: MEMORY
                  Source: Yara matchFile source: C:\ProgramData\DivXConverter\DivXConverter.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe, type: DROPPED
                  Source: Yara matchFile source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-303L9.tmp, type: DROPPED
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile read: C:\Windows\win.iniJump to behavior
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
                  Source: megasoftdivxconverter.exe, megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                  Source: megasoftdivxconverter.exe, megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                  Source: megasoftdivxconverter.exe, megasoftdivxconverter.exe, 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmp, megasoftdivxconverter.exe, 00000003.00000003.2083520315.00000000008CA000.00000004.00000020.00020000.00000000.sdmp, sqlite3.dll.3.dr, is-UTFL3.tmp.1.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                  Source: vwZcJ81cpN.exeReversingLabs: Detection: 42%
                  Source: vwZcJ81cpN.exeString found in binary or memory: need to be updated. /RESTARTAPPLICATIONS Instructs Setup to restart applications. /NORESTARTAPPLICATIONS Prevents Setup from restarting applications. /LOADINF="filename" Instructs Setup to load the settings from the specified file after having checked t
                  Source: vwZcJ81cpN.exeString found in binary or memory: /LOADINF="filename"
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeFile read: C:\Users\user\Desktop\vwZcJ81cpN.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\vwZcJ81cpN.exe "C:\Users\user\Desktop\vwZcJ81cpN.exe"
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeProcess created: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp "C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp" /SL5="$20436,3102839,56832,C:\Users\user\Desktop\vwZcJ81cpN.exe"
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe "C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe" -i
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeProcess created: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp "C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp" /SL5="$20436,3102839,56832,C:\Users\user\Desktop\vwZcJ81cpN.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe "C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe" -iJump to behavior
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: shfolder.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: msacm32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: winmmbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: riched20.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: usp10.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: msls31.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: explorerframe.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: sfc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: sqlite3.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpWindow found: window name: TMainFormJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DivX Converter_is1Jump to behavior
                  Source: vwZcJ81cpN.exeStatic file information: File size 3351818 > 1048576
                  Source: Binary string: msvcp71.pdbx# source: is-HE37O.tmp.1.dr
                  Source: Binary string: msvcr71.pdb< source: is-DRJIL.tmp.1.dr
                  Source: Binary string: msvcp71.pdb source: is-HE37O.tmp.1.dr
                  Source: Binary string: MicrosoftWindowsGdiPlus-1.0.2600.1360-gdiplus.pdb source: is-6VN1H.tmp.1.dr
                  Source: Binary string: msvcr71.pdb source: is-DRJIL.tmp.1.dr

                  Data Obfuscation

                  barindex
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeUnpacked PE file: 3.2.megasoftdivxconverter.exe.400000.0.unpack .amtt2:ER;.antt2:R;.aott2:W;.rsrc:R;.aptt2:EW; vs .text:ER;.rdata:R;.data:W;.vmp0:ER;.rsrc:R;
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeUnpacked PE file: 3.2.megasoftdivxconverter.exe.400000.0.unpack
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
                  Source: initial sampleStatic PE information: section where entry point is pointing to: .amtt2
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: section name: .amtt2
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: section name: .antt2
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: section name: .aott2
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: section name: .aptt2
                  Source: is-6VN1H.tmp.1.drStatic PE information: section name: Shared
                  Source: is-UTFL3.tmp.1.drStatic PE information: section name: /4
                  Source: is-UTFL3.tmp.1.drStatic PE information: section name: /19
                  Source: is-UTFL3.tmp.1.drStatic PE information: section name: /35
                  Source: is-UTFL3.tmp.1.drStatic PE information: section name: /51
                  Source: is-UTFL3.tmp.1.drStatic PE information: section name: /63
                  Source: is-UTFL3.tmp.1.drStatic PE information: section name: /77
                  Source: is-UTFL3.tmp.1.drStatic PE information: section name: /89
                  Source: is-UTFL3.tmp.1.drStatic PE information: section name: /102
                  Source: is-UTFL3.tmp.1.drStatic PE information: section name: /113
                  Source: is-UTFL3.tmp.1.drStatic PE information: section name: /124
                  Source: DivXConverter.exe.3.drStatic PE information: section name: .amtt2
                  Source: DivXConverter.exe.3.drStatic PE information: section name: .antt2
                  Source: DivXConverter.exe.3.drStatic PE information: section name: .aott2
                  Source: DivXConverter.exe.3.drStatic PE information: section name: .aptt2
                  Source: sqlite3.dll.3.drStatic PE information: section name: /4
                  Source: sqlite3.dll.3.drStatic PE information: section name: /19
                  Source: sqlite3.dll.3.drStatic PE information: section name: /35
                  Source: sqlite3.dll.3.drStatic PE information: section name: /51
                  Source: sqlite3.dll.3.drStatic PE information: section name: /63
                  Source: sqlite3.dll.3.drStatic PE information: section name: /77
                  Source: sqlite3.dll.3.drStatic PE information: section name: /89
                  Source: sqlite3.dll.3.drStatic PE information: section name: /102
                  Source: sqlite3.dll.3.drStatic PE information: section name: /113
                  Source: sqlite3.dll.3.drStatic PE information: section name: /124
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_004065C8 push 00406605h; ret 0_2_004065FD
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_004040B5 push eax; ret 0_2_004040F1
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00408104 push ecx; mov dword ptr [esp], eax0_2_00408109
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00404185 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00404206 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_0040C218 push eax; ret 0_2_0040C219
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_004042E8 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00404283 push 00404391h; ret 0_2_00404389
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00408F38 push 00408F6Bh; ret 0_2_00408F63
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040994C push 00409989h; ret 1_2_00409981
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00483F88 push 00484096h; ret 1_2_0048408E
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004062B4 push ecx; mov dword ptr [esp], eax1_2_004062B5
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004104E0 push ecx; mov dword ptr [esp], edx1_2_004104E5
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00412928 push 0041298Bh; ret 1_2_00412983
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00494CAC push ecx; mov dword ptr [esp], ecx1_2_00494CB1
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040CE38 push ecx; mov dword ptr [esp], edx1_2_0040CE3A
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004592D0 push 00459314h; ret 1_2_0045930C
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040F398 push ecx; mov dword ptr [esp], edx1_2_0040F39A
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00443440 push ecx; mov dword ptr [esp], ecx1_2_00443444
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040546D push eax; ret 1_2_004054A9
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040553D push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004055BE push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00485678 push ecx; mov dword ptr [esp], ecx1_2_0048567D
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0040563B push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004056A0 push 00405749h; ret 1_2_00405741
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004517F8 push 0045182Bh; ret 1_2_00451823
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004519BC push ecx; mov dword ptr [esp], eax1_2_004519C1
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00477B08 push ecx; mov dword ptr [esp], edx1_2_00477B09
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00419C28 push ecx; mov dword ptr [esp], ecx1_2_00419C2D
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045FD1C push ecx; mov dword ptr [esp], ecx1_2_0045FD20
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00499D30 pushad ; retf 1_2_00499D3F
                  Source: megasoftdivxconverter.exe.1.drStatic PE information: section name: .amtt2 entropy: 7.75224936493948
                  Source: DivXConverter.exe.3.drStatic PE information: section name: .amtt2 entropy: 7.75224936493948

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_009BE8A2
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeFile created: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-6VN1H.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\gdiplus.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcr71.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Temp\is-L1N35.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Temp\is-L1N35.tmp\_isetup\_iscrypt.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-UTFL3.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeFile created: C:\ProgramData\DivXConverter\DivXConverter.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\sqlite3.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcp71.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\is-FNEE7.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-9N953.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-DRJIL.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Temp\is-L1N35.tmp\_isetup\_shfoldr.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\unins000.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeFile created: C:\ProgramData\DivXConverter\sqlite3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpFile created: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-HE37O.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeFile created: C:\ProgramData\DivXConverter\DivXConverter.exeJump to dropped file
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeFile created: C:\ProgramData\DivXConverter\sqlite3.dllJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: CreateFileA,DeviceIoControl,GetLastError,CloseHandle, \\.\PhysicalDrive03_2_009BE8A2
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_0040195C StartServiceCtrlDispatcherA,3_2_0040195C
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00423C0C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,1_2_00423C0C
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004241DC IsIconic,SetActiveWindow,SetFocus,1_2_004241DC
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00424194 IsIconic,SetActiveWindow,1_2_00424194
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00418384 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,1_2_00418384
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0042285C SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,1_2_0042285C
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00417598 IsIconic,GetCapture,1_2_00417598
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0048393C IsIconic,GetWindowLongA,ShowWindow,ShowWindow,1_2_0048393C
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00417CCE IsIconic,SetWindowPos,1_2_00417CCE
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00417CD0 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,1_2_00417CD0
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0041F118 GetVersion,SetErrorMode,LoadLibraryA,SetErrorMode,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_0041F118
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: LoadLibraryA,GetProcAddress,GetAdaptersInfo,FreeLibrary,3_2_009BE9A6
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\gdiplus.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-6VN1H.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcr71.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-L1N35.tmp\_isetup\_setup64.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-L1N35.tmp\_isetup\_iscrypt.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-UTFL3.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcp71.dll (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\is-FNEE7.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-9N953.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-DRJIL.tmpJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-L1N35.tmp\_isetup\_shfoldr.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\unins000.exe (copy)Jump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-HE37O.tmpJump to dropped file
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_0-5981
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_3-61511
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeAPI coverage: 3.0 %
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe TID: 6728Thread sleep count: 82 > 30Jump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe TID: 6728Thread sleep time: -164000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe TID: 6576Thread sleep time: -60000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeFile opened: PhysicalDrive0Jump to behavior
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeLast function: Thread delayed
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00452A60 FindFirstFileA,GetLastError,1_2_00452A60
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00474F88 FindFirstFileA,FindNextFileA,FindClose,1_2_00474F88
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004980A4 FindFirstFileA,SetFileAttributesA,FindNextFileA,FindClose,1_2_004980A4
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00464158 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00464158
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00462750 FindFirstFileA,FindNextFileA,FindClose,1_2_00462750
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00463CDC SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,1_2_00463CDC
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00409B78 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,0_2_00409B78
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeThread delayed: delay time: 60000Jump to behavior
                  Source: megasoftdivxconverter.exe, 00000003.00000002.3931052614.00000000008B8000.00000004.00000020.00020000.00000000.sdmp, megasoftdivxconverter.exe, 00000003.00000002.3932565761.0000000003330000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeAPI call chain: ExitProcess graph end nodegraph_0-6778
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_3-61407
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009C80F0 IsDebuggerPresent,3_2_009C80F0
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009CE6AE RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,3_2_009CE6AE
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004502C0 GetVersion,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_004502C0
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009B5E59 RtlInitializeCriticalSection,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetProcAddress,GetTickCount,GetVersionExA,_memset,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,_malloc,GetProcessHeap,GetProcessHeap,RtlAllocateHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,GetProcessHeap,RtlAllocateHeap,_memset,_memset,_memset,RtlEnterCriticalSection,RtlLeaveCriticalSection,_malloc,_malloc,_malloc,_malloc,QueryPerformanceCounter,Sleep,_malloc,_malloc,_memset,_memset,Sleep,RtlEnterCriticalSection,RtlLeaveCriticalSection,3_2_009B5E59
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009C80DA SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_009C80DA
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_00478504 ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,1_2_00478504
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0042E09C AllocateAndInitializeSid,GetVersion,GetModuleHandleA,GetProcAddress,CheckTokenMembership,GetCurrentThread,OpenThreadToken,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,GetTokenInformation,EqualSid,CloseHandle,FreeSid,1_2_0042E09C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_009BE85A cpuid 3_2_009BE85A
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: GetLocaleInfoA,0_2_0040520C
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: GetLocaleInfoA,0_2_00405258
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: GetLocaleInfoA,1_2_00408568
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: GetLocaleInfoA,1_2_004085B4
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_004585C8 GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,CreateFileA,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,1_2_004585C8
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_004026C4 GetSystemTime,0_2_004026C4
                  Source: C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmpCode function: 1_2_0045559C GetUserNameA,1_2_0045559C
                  Source: C:\Users\user\Desktop\vwZcJ81cpN.exeCode function: 0_2_00405CF4 GetVersionExA,0_2_00405CF4

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 00000003.00000002.3932286201.0000000002CD1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: megasoftdivxconverter.exe PID: 6540, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 00000003.00000002.3932286201.0000000002CD1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: megasoftdivxconverter.exe PID: 6540, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609660FA sqlite3_finalize,sqlite3_free,sqlite3_value_numeric_type,sqlite3_value_numeric_type,sqlite3_value_text,sqlite3_value_int,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_mprintf,sqlite3_malloc,sqlite3_free,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,3_2_609660FA
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6090C1D6 sqlite3_clear_bindings,sqlite3_mutex_enter,sqlite3_mutex_leave,3_2_6090C1D6
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60963143 sqlite3_stricmp,sqlite3_bind_int64,sqlite3_mutex_leave,3_2_60963143
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096A2BD sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,3_2_6096A2BD
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096923E sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_malloc,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_realloc,sqlite3_realloc,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,3_2_6096923E
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096A38C sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,3_2_6096A38C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096748C sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_reset,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_malloc,sqlite3_bind_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_reset,memcmp,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_column_int,sqlite3_reset,sqlite3_step,sqlite3_column_int64,sqlite3_reset,sqlite3_bind_int64,sqlite3_realloc,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,3_2_6096748C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609254B1 sqlite3_bind_zeroblob,sqlite3_mutex_leave,3_2_609254B1
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094B407 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,3_2_6094B407
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6090F435 sqlite3_bind_parameter_index,3_2_6090F435
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609255D4 sqlite3_mutex_leave,sqlite3_bind_text16,3_2_609255D4
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609255FF sqlite3_bind_text,3_2_609255FF
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096A5EE sqlite3_value_text,sqlite3_value_bytes,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_malloc,sqlite3_column_int,sqlite3_column_int64,sqlite3_column_text,sqlite3_column_bytes,sqlite3_finalize,sqlite3_step,sqlite3_free,sqlite3_finalize,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_column_int,sqlite3_step,sqlite3_reset,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_column_int64,sqlite3_column_int,sqlite3_column_text,sqlite3_column_bytes,sqlite3_step,sqlite3_finalize,sqlite3_strnicmp,sqlite3_strnicmp,sqlite3_bind_int,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_malloc,sqlite3_bind_null,sqlite3_step,sqlite3_reset,sqlite3_value_int,sqlite3_value_text,sqlite3_value_bytes,sqlite3_free,3_2_6096A5EE
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094B54C sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,memmove,3_2_6094B54C
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60925686 sqlite3_bind_int64,sqlite3_mutex_leave,3_2_60925686
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094A6C5 sqlite3_bind_int64,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_malloc,sqlite3_reset,sqlite3_free,3_2_6094A6C5
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609256E5 sqlite3_bind_int,sqlite3_bind_int64,3_2_609256E5
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094B6ED sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,3_2_6094B6ED
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6092562A sqlite3_bind_blob,3_2_6092562A
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60925655 sqlite3_bind_null,sqlite3_mutex_leave,3_2_60925655
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094C64A sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_free,3_2_6094C64A
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_609687A7 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_column_blob,sqlite3_column_bytes,sqlite3_column_int64,sqlite3_reset,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_bind_int64,sqlite3_bind_int,sqlite3_step,sqlite3_reset,sqlite3_free,sqlite3_free,3_2_609687A7
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095F7F7 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,3_2_6095F7F7
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6092570B sqlite3_bind_double,sqlite3_mutex_leave,3_2_6092570B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095F772 sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6095F772
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60925778 sqlite3_bind_value,sqlite3_bind_int64,sqlite3_bind_double,sqlite3_bind_blob,3_2_60925778
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6090577D sqlite3_bind_parameter_name,3_2_6090577D
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094B764 sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_step,3_2_6094B764
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6090576B sqlite3_bind_parameter_count,3_2_6090576B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094A894 sqlite3_bind_int64,sqlite3_step,sqlite3_column_int64,sqlite3_reset,3_2_6094A894
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095F883 sqlite3_bind_int64,sqlite3_bind_int,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6095F883
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094C8C2 sqlite3_value_int,sqlite3_value_int,sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_bind_null,sqlite3_bind_null,sqlite3_step,sqlite3_reset,3_2_6094C8C2
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096281E sqlite3_mprintf,sqlite3_vtab_config,sqlite3_malloc,sqlite3_mprintf,sqlite3_mprintf,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_exec,sqlite3_free,sqlite3_prepare_v2,sqlite3_bind_text,sqlite3_step,sqlite3_column_int64,sqlite3_finalize,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_errmsg,sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_free,sqlite3_mprintf,sqlite3_free,sqlite3_declare_vtab,sqlite3_errmsg,sqlite3_mprintf,sqlite3_free,3_2_6096281E
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6096583A memcmp,sqlite3_realloc,qsort,sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_int64,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_step,sqlite3_reset,3_2_6096583A
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095F9AD sqlite3_bind_int,sqlite3_step,sqlite3_column_type,sqlite3_reset,3_2_6095F9AD
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6094A92B sqlite3_bind_int64,sqlite3_bind_null,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6094A92B
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6090EAE5 sqlite3_transfer_bindings,3_2_6090EAE5
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095FB98 sqlite3_value_int,sqlite3_bind_int,sqlite3_bind_value,sqlite3_step,sqlite3_reset,3_2_6095FB98
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095ECA6 sqlite3_mprintf,sqlite3_mprintf,sqlite3_mprintf,sqlite3_prepare_v2,sqlite3_free,sqlite3_bind_value,3_2_6095ECA6
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095FCCE sqlite3_malloc,sqlite3_free,sqlite3_bind_int64,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,3_2_6095FCCE
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095FDAE sqlite3_malloc,sqlite3_bind_int,sqlite3_step,sqlite3_column_bytes,sqlite3_column_blob,sqlite3_reset,sqlite3_free,sqlite3_free,sqlite3_bind_int,sqlite3_bind_blob,sqlite3_step,sqlite3_reset,sqlite3_free,3_2_6095FDAE
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60966DF1 sqlite3_value_text,sqlite3_mprintf,sqlite3_free,strcmp,sqlite3_free,sqlite3_malloc,sqlite3_bind_int64,sqlite3_step,sqlite3_column_type,sqlite3_reset,sqlite3_column_blob,sqlite3_reset,sqlite3_malloc,sqlite3_free,sqlite3_reset,sqlite3_result_error_code,sqlite3_result_blob,3_2_60966DF1
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_60969D75 sqlite3_bind_int,sqlite3_step,sqlite3_column_int,sqlite3_reset,3_2_60969D75
                  Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exeCode function: 3_2_6095FFB2 sqlite3_bind_int64,sqlite3_step,sqlite3_reset,sqlite3_result_error_code,3_2_6095FFB2
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  1
                  Deobfuscate/Decode Files or Information
                  1
                  Input Capture
                  1
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Command and Scripting Interpreter
                  5
                  Windows Service
                  1
                  DLL Side-Loading
                  3
                  Obfuscated Files or Information
                  LSASS Memory1
                  Account Discovery
                  Remote Desktop Protocol1
                  Input Capture
                  21
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  1
                  Bootkit
                  1
                  Access Token Manipulation
                  21
                  Software Packing
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook5
                  Windows Service
                  1
                  DLL Side-Loading
                  NTDS35
                  System Information Discovery
                  Distributed Component Object ModelInput Capture12
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
                  Process Injection
                  1
                  Masquerading
                  LSA Secrets241
                  Security Software Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials1
                  Process Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Access Token Manipulation
                  DCSync121
                  Virtualization/Sandbox Evasion
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                  Process Injection
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Bootkit
                  /etc/passwd and /etc/shadow3
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  vwZcJ81cpN.exe42%ReversingLabsWin32.Trojan.Sockssystemz
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe100%Joe Sandbox ML
                  C:\ProgramData\DivXConverter\DivXConverter.exe100%Joe Sandbox ML
                  C:\ProgramData\DivXConverter\DivXConverter.exe52%ReversingLabsWin32.Trojan.Generic
                  C:\ProgramData\DivXConverter\sqlite3.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\gdiplus.dll (copy)0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-6VN1H.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-9N953.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-DRJIL.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-HE37O.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-UTFL3.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.dll (copy)0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe52%ReversingLabsWin32.Trojan.Generic
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcp71.dll (copy)0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\msvcr71.dll (copy)0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\sqlite3.dll (copy)0%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\is-FNEE7.tmp4%ReversingLabs
                  C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\uninstall\unins000.exe (copy)4%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp4%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\is-L1N35.tmp\_isetup\_iscrypt.dll0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\is-L1N35.tmp\_isetup\_setup64.tmp0%ReversingLabs
                  C:\Users\user\AppData\Local\Temp\is-L1N35.tmp\_isetup\_shfoldr.dll0%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d005633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a201bd23184false
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.innosetup.com/vwZcJ81cpN.tmp, vwZcJ81cpN.tmp, 00000001.00000000.2069274246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, vwZcJ81cpN.tmp.0.dr, is-FNEE7.tmp.1.drfalse
                      high
                      http://www.remobjects.com/psUvwZcJ81cpN.exe, 00000000.00000003.2068834520.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.2068685370.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000000.2069274246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, vwZcJ81cpN.tmp.0.dr, is-FNEE7.tmp.1.drfalse
                        high
                        https://188.119.66.185/priseCertificatesmegasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000990000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUvwZcJ81cpN.exefalse
                            high
                            https://188.119.66.185/rosoftmegasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000990000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://188.119.66.185/megasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000990000.00000004.00000020.00020000.00000000.sdmp, megasoftdivxconverter.exe, 00000003.00000002.3932565761.0000000003378000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://188.119.66.185/7megasoftdivxconverter.exe, 00000003.00000002.3932565761.0000000003378000.00000004.00000020.00020000.00000000.sdmpfalse
                                  unknown
                                  https://188.119.66.185/en-GBmegasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000990000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlinevwZcJ81cpN.exefalse
                                      high
                                      http://www.remobjects.com/psvwZcJ81cpN.exe, 00000000.00000003.2068834520.00000000020A8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.2068685370.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, vwZcJ81cpN.tmp, 00000001.00000000.2069274246.0000000000401000.00000020.00000001.01000000.00000004.sdmp, vwZcJ81cpN.tmp.0.dr, is-FNEE7.tmp.1.drfalse
                                        high
                                        https://www.easycutstudio.com/support.htmlvwZcJ81cpN.exe, 00000000.00000003.2068038906.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000003.2068117274.00000000020A1000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.exe, 00000000.00000002.3930749062.00000000020A1000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000003.2070166188.00000000021A8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000002.3930848443.0000000000679000.00000004.00000020.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000002.3931022765.00000000021A8000.00000004.00001000.00020000.00000000.sdmp, vwZcJ81cpN.tmp, 00000001.00000003.2070069699.0000000003120000.00000004.00001000.00020000.00000000.sdmpfalse
                                          high
                                          https://188.119.66.185/ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b325megasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000972000.00000004.00000020.00020000.00000000.sdmp, megasoftdivxconverter.exe, 00000003.00000002.3931052614.00000000009A6000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://188.119.66.185/allowedCert_OS_1megasoftdivxconverter.exe, 00000003.00000002.3931052614.0000000000990000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              188.119.66.185
                                              unknownRussian Federation
                                              209499FLYNETRUfalse
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1579793
                                              Start date and time:2024-12-23 09:20:03 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 7m 17s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Run name:Run with higher sleep bypass
                                              Number of analysed new started processes analysed:6
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:vwZcJ81cpN.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:8d647e31e2e4241606104564b0efa364.exe
                                              Detection:MAL
                                              Classification:mal96.troj.evad.winEXE@5/26@0/1
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 92%
                                              • Number of executed functions: 181
                                              • Number of non-executed functions: 283
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                              • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                              • Excluded IPs from analysis (whitelisted): 13.107.246.63, 172.202.163.200
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              • VT rate limit hit for: vwZcJ81cpN.exe
                                              No simulations
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              188.119.66.185r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                  gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                    Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                      steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                        stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                          basx.exeGet hashmaliciousSocks5SystemzBrowse
                                                            list.exeGet hashmaliciousSocks5SystemzBrowse
                                                              newwork.exe.1.exeGet hashmaliciousSocks5SystemzBrowse
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                FLYNETRUr4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                https://drive.google.com/file/d/1zySfUjQ3GqIVAlBHIX3CXdgIcWIqrMkO/view?usp=sharing_eip&ts=67645d30Get hashmaliciousUnknownBrowse
                                                                • 188.119.66.154
                                                                https://drive.google.com/file/d/1zySfUjQ3GqIVAlBHIX3CXdgIcWIqrMkO/view?usp=sharing_eil&ts=67645d30Get hashmaliciousUnknownBrowse
                                                                • 188.119.66.154
                                                                Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                basx.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                51c64c77e60f3980eea90869b68c58a8r4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                WindowsUpdate.exeGet hashmaliciousUnknownBrowse
                                                                • 188.119.66.185
                                                                Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                basx.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                list.exeGet hashmaliciousSocks5SystemzBrowse
                                                                • 188.119.66.185
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\ProgramData\DivXConverter\sqlite3.dllr4xiHKy8aM.exeGet hashmaliciousSocks5SystemzBrowse
                                                                  gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    gjEtERlBSv.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      Hbq580QZAR.exeGet hashmaliciousSocks5SystemzBrowse
                                                                        steel.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                          stories.exe.2.exeGet hashmaliciousSocks5SystemzBrowse
                                                                            basx.exeGet hashmaliciousSocks5SystemzBrowse
                                                                              list.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                newwork.exe.1.exeGet hashmaliciousSocks5SystemzBrowse
                                                                                  Process:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):3148960
                                                                                  Entropy (8bit):6.439028457562172
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:GDawBQUB1RgTLnZXjyZjyPH5zyqXSiZktry5LaNPA4Zy04:kasWnZXjSyPH5zyqXSmk5OLaJZV4
                                                                                  MD5:8FB49FA4DAF45523188E06A18EB4B95A
                                                                                  SHA1:D16A13952BB95E7D78BC72B40B833B889C365774
                                                                                  SHA-256:BECE9D307723DA8E9148C4F8143FEA0CDCBDD58A7EC26BAD1F08701B564A9C23
                                                                                  SHA-512:C598D3E2E60D0A6ACE343910F7C6A5959038CB288FA3BA159363054B6BB17167D9AC5F317609CC448AF24A347B3F371E0E55C448D8934801D1209FFC141ABAFA
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\DivXConverter\DivXConverter.exe, Author: Joe Security
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 52%
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L.....gg.............................V............@..........................p0.......0.....................................$........`..0\..............................................................................P............................amtt2..:........................... ..`.antt2..>4.......6..................@..@.aott2...e.......2..................@....rsrc....^...`...^..................@..@.aptt2...............f..............`.0.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):645592
                                                                                  Entropy (8bit):6.50414583238337
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                  MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                  SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                  SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                  SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: r4xiHKy8aM.exe, Detection: malicious, Browse
                                                                                  • Filename: gjEtERlBSv.exe, Detection: malicious, Browse
                                                                                  • Filename: gjEtERlBSv.exe, Detection: malicious, Browse
                                                                                  • Filename: Hbq580QZAR.exe, Detection: malicious, Browse
                                                                                  • Filename: steel.exe.2.exe, Detection: malicious, Browse
                                                                                  • Filename: stories.exe.2.exe, Detection: malicious, Browse
                                                                                  • Filename: basx.exe, Detection: malicious, Browse
                                                                                  • Filename: list.exe, Detection: malicious, Browse
                                                                                  • Filename: newwork.exe.1.exe, Detection: malicious, Browse
                                                                                  Reputation:high, very likely benign file
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                  Process:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):8
                                                                                  Entropy (8bit):2.0
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:4:4
                                                                                  MD5:F2C069CE6B24A0A900DDADE9ECECC1CF
                                                                                  SHA1:8F5309C5D75FEA942ED6F2719EC1E5E6FE7B5398
                                                                                  SHA-256:74EB8FD8D96F8904963CA504CE51E6596206E0D4B9F3299FBA3A3B0543575A6E
                                                                                  SHA-512:7D319240DE7C043D10DCAF1545A79A9FDF0E8FF05B4F32055873C210492DECD933C474C3804FA2D1AB8143834ED9B9D071823862A2043DF6F54796B6E3512967
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:..ig....
                                                                                  Process:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):0.8112781244591328
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:M:M
                                                                                  MD5:4352D88A78AA39750BF70CD6F27BCAA5
                                                                                  SHA1:3C585604E87F855973731FEA83E21FAB9392D2FC
                                                                                  SHA-256:67ABDD721024F0FF4E0B3F4C2FC13BC5BAD42D0B7851D456D88D203D15AAA450
                                                                                  SHA-512:EDF92E3D4F80FC47D948EA2F17B9BFC742D34E2E785A7A4927F3E261E8BD9D400B648BFF2123B8396D24FB28F5869979E08D58B4B5D156E640344A2C0A54675D
                                                                                  Malicious:false
                                                                                  Reputation:moderate, very likely benign file
                                                                                  Preview:....
                                                                                  Process:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                  File Type:ASCII text, with no line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):128
                                                                                  Entropy (8bit):2.9012093522336393
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:ObXXXd0AbDBdUBWetxt:Or9Lb3UFx
                                                                                  MD5:679DD163372163CD8FFC24E3C9E758B3
                                                                                  SHA1:F307C14CA65810C8D0238B89B49B2ACD7C5B233B
                                                                                  SHA-256:510EA89D00FA427C33BD67AEEA60D21066976F085959C2AFE1F69411A8CA722D
                                                                                  SHA-512:46C464F15BCE39E28DCD48AF36C424845631D2B48D7E37D7FBBBEE0BC4DF32445A2810E397BF29FCA76C0364B1AA30CC05DCF4D9E799C6C697B49A174560969C
                                                                                  Malicious:false
                                                                                  Preview:12b48997735ce8b4537cf99be74bb62f518d3799011c89eb7c719048e83fac56................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):1645320
                                                                                  Entropy (8bit):6.787752063353702
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:Fk18V2mHkfIE3Ip9vkWEgDecZV3W9kpOuRw8RhWd5Ixwzr6lOboU7j97S9D+z98v:FZNkf+uW3D1ZVG9kVw8I5Rv6lwH9+X
                                                                                  MD5:871C903A90C45CA08A9D42803916C3F7
                                                                                  SHA1:D962A12BC15BFB4C505BB63F603CA211588958DB
                                                                                  SHA-256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
                                                                                  SHA-512:985B0B8B5E3D96ACFD0514676D9F0C5D2D8F11E31F01ACFA0F7DA9AF3568E12343CA77F541F55EDDA6A0E5C14FE733BDA5DC1C10BB170D40D15B7A60AD000145
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s...7o..7o..7o...L..<o..7o..en...L..$o...L...o...L..6o...L..6o...L..(n...L..6o..Rich7o..................PE..L.....D@...........!.........`.......Q.......`.....p................................................................l...CN..|...x....p...........................s.....8...............................................0............................text...n........................... ..`.data...X...........................@...Shared.......`.......P..............@....rsrc........p... ...`..............@..@.reloc...s..........................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:data
                                                                                  Category:dropped
                                                                                  Size (bytes):3148960
                                                                                  Entropy (8bit):6.439028029427195
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:LDawBQUB1RgTLnZXjyZjyPH5zyqXSiZktry5LaNPA4Zy04:3asWnZXjSyPH5zyqXSmk5OLaJZV4
                                                                                  MD5:57F16FED97A4F26E62603C4B10FB4803
                                                                                  SHA1:55BA04C0643A2A0DB37A184BFF1B96D40F5E5899
                                                                                  SHA-256:F9EAA58F5F6C14232D6870A9E9338E91B72A5BD461838D7D5A800408F17968D5
                                                                                  SHA-512:B4592932F94AA2589C8B7A4841C0983880CB5E2A65628F1844247C3F407CA677BD9A43923B6291A500AF833EDCBEBC4DE03D6F6FCB93E5EBBEEFA2BB0F8918AD
                                                                                  Malicious:false
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\is-303L9.tmp, Author: Joe Security
                                                                                  Preview:.Z......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L.....gg.............................V............@..........................p0.......0.....................................$........`..0\..............................................................................P............................amtt2..:........................... ..`.antt2..>4.......6..................@..@.aott2...e.......2..................@....rsrc....^...`...^..................@..@.aptt2...............f..............`.0.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):1645320
                                                                                  Entropy (8bit):6.787752063353702
                                                                                  Encrypted:false
                                                                                  SSDEEP:24576:Fk18V2mHkfIE3Ip9vkWEgDecZV3W9kpOuRw8RhWd5Ixwzr6lOboU7j97S9D+z98v:FZNkf+uW3D1ZVG9kVw8I5Rv6lwH9+X
                                                                                  MD5:871C903A90C45CA08A9D42803916C3F7
                                                                                  SHA1:D962A12BC15BFB4C505BB63F603CA211588958DB
                                                                                  SHA-256:F1DA32183B3DA19F75FA4EF0974A64895266B16D119BBB1DA9FE63867DBA0645
                                                                                  SHA-512:985B0B8B5E3D96ACFD0514676D9F0C5D2D8F11E31F01ACFA0F7DA9AF3568E12343CA77F541F55EDDA6A0E5C14FE733BDA5DC1C10BB170D40D15B7A60AD000145
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......s...7o..7o..7o...L..<o..7o..en...L..$o...L...o...L..6o...L..6o...L..(n...L..6o..Rich7o..................PE..L.....D@...........!.........`.......Q.......`.....p................................................................l...CN..|...x....p...........................s.....8...............................................0............................text...n........................... ..`.data...X...........................@...Shared.......`.......P..............@....rsrc........p... ...`..............@..@.reloc...s..........................@..B................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):176128
                                                                                  Entropy (8bit):6.204917493416147
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:l9iEoC1+7N9UQV2Mi8NTUU3/EO3h3E9y6GeoPRtsoWhi75MUbvSHQ:l+ssU62Mi8x9P/UVGeQRthMUbvS
                                                                                  MD5:FEC4FF0C2967A05543747E8D552CF9DF
                                                                                  SHA1:B4449DC0DF8C0AFCC9F32776384A6F5B5CEDE20C
                                                                                  SHA-256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
                                                                                  SHA-512:93E3F48CD393314178CBC86F6142D577D5EAAE52B47C4D947DBA4DFB706860B150FF5B0E546CB83114CA44666E9DF6021964D79D064B775A58698DAA9550EF13
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+0.J^..J^..J^.cE...J^..VR..J^..UU..J^.#VP..J^..UT..J^..UZ..J^..kU..J^..kZ..J^..J_..J^..iT..J^..io..J^.gLX..J^._jZ..J^.Rich.J^.................PE..L.....L...........!.....0...@.......'.......@...................................................................... e..k....X..d....`.......................p..p....................................................@...............................text....".......0.................. ..`.rdata...%...@...0...@..............@..@.data...T....p... ...p..............@....rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):348160
                                                                                  Entropy (8bit):6.542655141037356
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                  MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                  SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                  SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                  SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):499712
                                                                                  Entropy (8bit):6.414789978441117
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                  MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                  SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                  SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                  SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:MS Windows HtmlHelp Data
                                                                                  Category:dropped
                                                                                  Size (bytes):78183
                                                                                  Entropy (8bit):7.692742945771669
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:Bkt2SjEQ3r94YqwyadpL1X6Dtn4afF1VowWb8ZmmUQNk3gNqCLbMsFxJse8hbpmn:mR/CYj9dp5XIyI2b/mY3gNjLbMsOaP
                                                                                  MD5:B1B9E6D43319F6D4E52ED858C5726A97
                                                                                  SHA1:5033047A30CCCF57783C600FD76A6D220021B19D
                                                                                  SHA-256:8003A4A0F9F5DFB62BEFBF81F8C05894B0C1F987ACFC8654A6C6CE02B6213910
                                                                                  SHA-512:E56D6EC9170DEBAC28BB514942F794F73D4C194D04C54EFF9227B6EE3C74BA4FCF239FFF0BB6556DC8B847FA89D382AF206A2C481C41A3510936B0A74192D2C2
                                                                                  Malicious:false
                                                                                  Preview:ITSF....`..........E.......|.{.......".....|.{......."..`...............x.......T.......................g1..............ITSP....T...........................................j..].!......."..T...............PMGLW................/..../#IDXHDR...F.../#ITBITS..../#IVB...N$./#STRINGS.....P./#SYSTEM..N.'./#TOPICS...F.0./#URLSTR...:.t./#URLTBL...v.D./$FIftiMain......1./$OBJINST...z.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...v../$WWKeywordLinks/..../$WWKeywordLinks/Property...r../After.jpg...4..../Auto-.hhc...^./Auto-Adjustment.htm....?./Auto-BleachTeeth.htm...z.3./Auto-Crop2Plus.htm..U.j./Auto-Emphasis.htm...w.V./Auto-EyeColor.htm...!.../Auto-EyePencil.htm..._.../Auto-EyeShadow.htm...,.3./Auto-GettingStarted.htm....Q./Auto-Lipstick.htm..R.M./Auto-Liquify.htm...-.v./Auto-Menu.htm..S.r./Auto-OrderingInformation.htm...Q.../Auto-Overview.htm..^.$./Auto-Powder.htm......./Auto-Resize.htm..s.b./Auto-Rotation.htm..?.e./Auto-Rouge.htm...=.d./Auto-SkinCare.htm...|.{./Auto-SmartPatchCosmet
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):645592
                                                                                  Entropy (8bit):6.50414583238337
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                  MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                  SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                  SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                  SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:MS Windows HtmlHelp Data
                                                                                  Category:dropped
                                                                                  Size (bytes):78183
                                                                                  Entropy (8bit):7.692742945771669
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:Bkt2SjEQ3r94YqwyadpL1X6Dtn4afF1VowWb8ZmmUQNk3gNqCLbMsFxJse8hbpmn:mR/CYj9dp5XIyI2b/mY3gNjLbMsOaP
                                                                                  MD5:B1B9E6D43319F6D4E52ED858C5726A97
                                                                                  SHA1:5033047A30CCCF57783C600FD76A6D220021B19D
                                                                                  SHA-256:8003A4A0F9F5DFB62BEFBF81F8C05894B0C1F987ACFC8654A6C6CE02B6213910
                                                                                  SHA-512:E56D6EC9170DEBAC28BB514942F794F73D4C194D04C54EFF9227B6EE3C74BA4FCF239FFF0BB6556DC8B847FA89D382AF206A2C481C41A3510936B0A74192D2C2
                                                                                  Malicious:false
                                                                                  Preview:ITSF....`..........E.......|.{.......".....|.{......."..`...............x.......T.......................g1..............ITSP....T...........................................j..].!......."..T...............PMGLW................/..../#IDXHDR...F.../#ITBITS..../#IVB...N$./#STRINGS.....P./#SYSTEM..N.'./#TOPICS...F.0./#URLSTR...:.t./#URLTBL...v.D./$FIftiMain......1./$OBJINST...z.../$WWAssociativeLinks/..../$WWAssociativeLinks/Property...v../$WWKeywordLinks/..../$WWKeywordLinks/Property...r../After.jpg...4..../Auto-.hhc...^./Auto-Adjustment.htm....?./Auto-BleachTeeth.htm...z.3./Auto-Crop2Plus.htm..U.j./Auto-Emphasis.htm...w.V./Auto-EyeColor.htm...!.../Auto-EyePencil.htm..._.../Auto-EyeShadow.htm...,.3./Auto-GettingStarted.htm....Q./Auto-Lipstick.htm..R.M./Auto-Liquify.htm...-.v./Auto-Menu.htm..S.r./Auto-OrderingInformation.htm...Q.../Auto-Overview.htm..^.$./Auto-Powder.htm......./Auto-Resize.htm..s.b./Auto-Rotation.htm..?.e./Auto-Rouge.htm...=.d./Auto-SkinCare.htm...|.{./Auto-SmartPatchCosmet
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):176128
                                                                                  Entropy (8bit):6.204917493416147
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:l9iEoC1+7N9UQV2Mi8NTUU3/EO3h3E9y6GeoPRtsoWhi75MUbvSHQ:l+ssU62Mi8x9P/UVGeQRthMUbvS
                                                                                  MD5:FEC4FF0C2967A05543747E8D552CF9DF
                                                                                  SHA1:B4449DC0DF8C0AFCC9F32776384A6F5B5CEDE20C
                                                                                  SHA-256:5374148EBCF4B456F8711516A58C9A007A393CA88F3D9759041F691E4343C7D6
                                                                                  SHA-512:93E3F48CD393314178CBC86F6142D577D5EAAE52B47C4D947DBA4DFB706860B150FF5B0E546CB83114CA44666E9DF6021964D79D064B775A58698DAA9550EF13
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+0.J^..J^..J^.cE...J^..VR..J^..UU..J^.#VP..J^..UT..J^..UZ..J^..kU..J^..kZ..J^..J_..J^..iT..J^..io..J^.gLX..J^._jZ..J^.Rich.J^.................PE..L.....L...........!.....0...@.......'.......@...................................................................... e..k....X..d....`.......................p..p....................................................@...............................text....".......0.................. ..`.rdata...%...@...0...@..............@..@.data...T....p... ...p..............@....rsrc........`......................@..@.reloc.......p......................@..B........................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:modified
                                                                                  Size (bytes):3148960
                                                                                  Entropy (8bit):6.439028457562172
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:GDawBQUB1RgTLnZXjyZjyPH5zyqXSiZktry5LaNPA4Zy04:kasWnZXjSyPH5zyqXSmk5OLaJZV4
                                                                                  MD5:8FB49FA4DAF45523188E06A18EB4B95A
                                                                                  SHA1:D16A13952BB95E7D78BC72B40B833B889C365774
                                                                                  SHA-256:BECE9D307723DA8E9148C4F8143FEA0CDCBDD58A7EC26BAD1F08701B564A9C23
                                                                                  SHA-512:C598D3E2E60D0A6ACE343910F7C6A5959038CB288FA3BA159363054B6BB17167D9AC5F317609CC448AF24A347B3F371E0E55C448D8934801D1209FFC141ABAFA
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe, Author: Joe Security
                                                                                  Antivirus:
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 52%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......................PE..L.....gg.............................V............@..........................p0.......0.....................................$........`..0\..............................................................................P............................amtt2..:........................... ..`.antt2..>4.......6..................@..@.aott2...e.......2..................@....rsrc....^...`...^..................@..@.aptt2...............f..............`.0.........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):499712
                                                                                  Entropy (8bit):6.414789978441117
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:fJzxYPVsBnxO/R7krZhUgiW6QR7t5k3Ooc8iHkC2eq:fZxvBnxOJ7ki3Ooc8iHkC2e
                                                                                  MD5:561FA2ABB31DFA8FAB762145F81667C2
                                                                                  SHA1:C8CCB04EEDAC821A13FAE314A2435192860C72B8
                                                                                  SHA-256:DF96156F6A548FD6FE5672918DE5AE4509D3C810A57BFFD2A91DE45A3ED5B23B
                                                                                  SHA-512:7D960AA8E3CCE22D63A6723D7F00C195DE7DE83B877ECA126E339E2D8CC9859E813E05C5C0A5671A75BB717243E9295FD13E5E17D8C6660EB59F5BAEE63A7C43
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............................................................................Rich...................PE..L.....w>...........!.................-............:|................................~e..............................$...?...d!..<....`.......................p...0..8...8...............................H............................................text............................... ..`.rdata..2*.......0..................@..@.data...h!...0... ...0..............@....rsrc........`.......P..............@..@.reloc...0...p...@...`..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):348160
                                                                                  Entropy (8bit):6.542655141037356
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
                                                                                  MD5:86F1895AE8C5E8B17D99ECE768A70732
                                                                                  SHA1:D5502A1D00787D68F548DDEEBBDE1ECA5E2B38CA
                                                                                  SHA-256:8094AF5EE310714CAEBCCAEEE7769FFB08048503BA478B879EDFEF5F1A24FEFE
                                                                                  SHA-512:3B7CE2B67056B6E005472B73447D2226677A8CADAE70428873F7EFA5ED11A3B3DBF6B1A42C5B05B1F2B1D8E06FF50DFC6532F043AF8452ED87687EEFBF1791DA
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2..S..S..S..Tp..S..S..5S..BX..S..BX...S..BX..Q..BX..S..BX..S..BX..S..Rich.S..........................PE..L.....V>...........!................."............4|.........................`......................................t....C......(.... .......................0..d+..H...8...........................x...H...............l............................text............................... ..`.rdata..@...........................@..@.data... h.......`..................@....rsrc........ ......................@..@.reloc..d+...0...0... ..............@..B........................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):645592
                                                                                  Entropy (8bit):6.50414583238337
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:i0zrcH2F3OfwjtWvuFEmhx0Cj37670jwX+E7tFKm0qTYh:iJUOfwh8u9hx0D70NE7tFTYh
                                                                                  MD5:E477A96C8F2B18D6B5C27BDE49C990BF
                                                                                  SHA1:E980C9BF41330D1E5BD04556DB4646A0210F7409
                                                                                  SHA-256:16574F51785B0E2FC29C2C61477EB47BB39F714829999511DC8952B43AB17660
                                                                                  SHA-512:335A86268E7C0E568B1C30981EC644E6CD332E66F96D2551B58A82515316693C1859D87B4F4B7310CF1AC386CEE671580FDD999C3BCB23ACF2C2282C01C8798C
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=S.v..?......!................X..............`......................... ......8......... .................................L................................'......................................................p............................text...............................`.0`.data...............................@.@..rdata..$...........................@.@@.bss..................................@..edata..............................@.0@.idata..L...........................@.0..CRT................................@.0..tls.... ...........................@.0..reloc...'.......(..................@.0B/4......`....0......................@.@B/19..........@......................@..B/35.....M....P......................@..B/51.....`C...`...D..................@..B/63..................8..............@..B/77..................F..............@..B/89..................R..
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):717985
                                                                                  Entropy (8bit):6.514923513596488
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:1TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+QIq5MRxyFf:dPcYn5c/rPx37/zHBA6pFptZ1CE9qMRG
                                                                                  MD5:A9C5640ADBBCA1842CD24EFE386C64C8
                                                                                  SHA1:A8591890503649B6B335D6D633D5F0821CCA61C2
                                                                                  SHA-256:5981E4A067B02E2AE0864AA400966EECC8F5408DC65F1A06DF44C946139E9670
                                                                                  SHA-512:EA3C3F8CFB06AB6E074AD928D2B59BAFA347E522DBFEBA04583336B96B2E9FA30213D268A1D3258C13803553AB28AD647DBEBAF59CD3FA1667288FCF99349351
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                                                  Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:InnoSetup Log DivX Converter, version 0x30, 4833 bytes, 571345\user, "C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11"
                                                                                  Category:dropped
                                                                                  Size (bytes):4833
                                                                                  Entropy (8bit):4.768043879581487
                                                                                  Encrypted:false
                                                                                  SSDEEP:96:hdWP38YpUb8vl99+eOIhGa7ICSss/Ln/N+cI0a:hdWP3zpUW0HIhRICSsAnda
                                                                                  MD5:0BF1BD0FD9921DBDE6A88804AC67F068
                                                                                  SHA1:7B2BEC71B1D93C1E115D652837A25DCE119AAC09
                                                                                  SHA-256:9EE53730691663FD962C3ED622DBBB5D02A9A996982C09D67CDB2AFEDADE9CDC
                                                                                  SHA-512:65E4AAE90BE75AD30C581D9B28EEFC9D00592D0D874985473C3840F5EDC57F447D66CAFC43871C0ACA687C34139943108ABC2CFED87CB020A2B5F9C74F9685E7
                                                                                  Malicious:false
                                                                                  Preview:Inno Setup Uninstall Log (b)....................................DivX Converter..................................................................................................................DivX Converter..................................................................................................................0...........%...............................................................................................................F>.e...........0......]....571345.user<C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11.............8.... ............IFPS.............................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.........TPASSWORDEDIT....TPASSWORDEDIT...........................................!MAIN....-1..(...dll:kernel32.dll.CreateFileA..............$...dll:kernel32.dll.WriteFile............"...dll:kernel32.dll.CloseHandle........"...dll:kernel32.dll.ExitProcess........%
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):717985
                                                                                  Entropy (8bit):6.514923513596488
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:1TPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+QIq5MRxyFf:dPcYn5c/rPx37/zHBA6pFptZ1CE9qMRG
                                                                                  MD5:A9C5640ADBBCA1842CD24EFE386C64C8
                                                                                  SHA1:A8591890503649B6B335D6D633D5F0821CCA61C2
                                                                                  SHA-256:5981E4A067B02E2AE0864AA400966EECC8F5408DC65F1A06DF44C946139E9670
                                                                                  SHA-512:EA3C3F8CFB06AB6E074AD928D2B59BAFA347E522DBFEBA04583336B96B2E9FA30213D268A1D3258C13803553AB28AD647DBEBAF59CD3FA1667288FCF99349351
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                                                  Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                  Process:C:\Users\user\Desktop\vwZcJ81cpN.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):706560
                                                                                  Entropy (8bit):6.5063746606736395
                                                                                  Encrypted:false
                                                                                  SSDEEP:12288:dTPcYn5c/rPx37/zHBA6a5UeYpthr1CERAgrNuR+QIq5MRxyF:1PcYn5c/rPx37/zHBA6pFptZ1CE9qMRU
                                                                                  MD5:397E7773A205B3947EEE196EA2F624B9
                                                                                  SHA1:6B3A5F48A8AE1F1395832B1051AC29AFF476FF9D
                                                                                  SHA-256:B33DC9C980150F8C15E73FE115271711CFA3FBAD37BAD63CD36E2A449D571182
                                                                                  SHA-512:2815C67A890E946E217C5B6032E7A32FD8967C940938E95FAF0D5B99B37BE1B567AFBE3811EC38A088D923036F1914763AC4F7033B8B022F636DD4FB7968E517
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................~........................@..............................................@...............................%..................................................................................................................CODE.....}.......~.................. ..`DATA................................@...BSS......................................idata...%.......&..................@....tls.....................................rdata..............................@..P.reloc....... ......................@..P.rsrc...............................@..P.....................T..............@..P........................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):2560
                                                                                  Entropy (8bit):2.8818118453929262
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:e1GSgDIX566lIB6SXvVmMPUjvhBrDsqZ:SgDKRlVImgUNBsG
                                                                                  MD5:A69559718AB506675E907FE49DEB71E9
                                                                                  SHA1:BC8F404FFDB1960B50C12FF9413C893B56F2E36F
                                                                                  SHA-256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC
                                                                                  SHA-512:E52E0AA7FE3F79E36330C455D944653D449BA05B2F9ABEE0914A0910C3452CFA679A40441F9AC696B3CCF9445CBB85095747E86153402FC362BB30AC08249A63
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........W.c.W.c.W.c...>.T.c.W.b.V.c.R.<.V.c.R.?.V.c.R.9.V.c.RichW.c.........................PE..L....b.@...........!......................... ...............................@......................................p ..}.... ..(............................0....................................................... ...............................text............................... ..`.rdata....... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):6144
                                                                                  Entropy (8bit):4.289297026665552
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:Sv1LfWvPcXegCPUo1vlZQrAxoONfHFZONfH3d1xCWMBFNL2pGSS4k+bkg6j0KHc:wfkcXegaJ/ZAYNzcld1xaX12pfSKvkc
                                                                                  MD5:C8871EFD8AF2CF4D9D42D1FF8FADBF89
                                                                                  SHA1:D0EACD5322C036554D509C7566F0BCC7607209BD
                                                                                  SHA-256:E4FC574A01B272C2D0AED0EC813F6D75212E2A15A5F5C417129DD65D69768F40
                                                                                  SHA-512:2735BB610060F749E26ACD86F2DF2B8A05F2BDD3DCCF3E4B2946EBB21BA0805FB492C474B1EEB2C5B8BF1A421F7C1B8728245F649C644F4A9ECC5BD8770A16F6
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....HP..........#............................@.............................`..............................................................<!.......P.......@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc........P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):23312
                                                                                  Entropy (8bit):4.596242908851566
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                  MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                  SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                  SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                  SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                  Malicious:false
                                                                                  Antivirus:
                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):7.997598934790829
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) a (10002005/4) 98.73%
                                                                                  • Inno Setup installer (109748/4) 1.08%
                                                                                  • Windows Screen Saver (13104/52) 0.13%
                                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                  File name:vwZcJ81cpN.exe
                                                                                  File size:3'351'818 bytes
                                                                                  MD5:8d647e31e2e4241606104564b0efa364
                                                                                  SHA1:427e9cd7cfb80db43c21187117c927397f21e774
                                                                                  SHA256:08b3976cf68e5714f6bded88a0aea5820946e94bdab8f88bf9c2792d51d21169
                                                                                  SHA512:0d50535e8795581961e5a9c0fe300db983b417168861f03692544414019741c989e6867285a053362e3b6496f31a24ff89e131dc4f10c9ed1fc005a9ca9de0eb
                                                                                  SSDEEP:98304:Me2+PsttllRq2vrpH/vC61RO5+2fOBYKPT6V:XDP0lRr9HnC6jO5+aEYTV
                                                                                  TLSH:90F5335098C7D836E6B34CF66C50842D8066FA63B6B711C83AFC8DED1FAA1585917F0B
                                                                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                  Icon Hash:2d2e3797b32b2b99
                                                                                  Entrypoint:0x40a5f8
                                                                                  Entrypoint Section:CODE
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                  DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:1
                                                                                  OS Version Minor:0
                                                                                  File Version Major:1
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:1
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:884310b1928934402ea6fec1dbd3cf5e
                                                                                  Instruction
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  add esp, FFFFFFC4h
                                                                                  push ebx
                                                                                  push esi
                                                                                  push edi
                                                                                  xor eax, eax
                                                                                  mov dword ptr [ebp-10h], eax
                                                                                  mov dword ptr [ebp-24h], eax
                                                                                  call 00007FAD108779E3h
                                                                                  call 00007FAD10878BEAh
                                                                                  call 00007FAD10878E79h
                                                                                  call 00007FAD10878F1Ch
                                                                                  call 00007FAD1087AEBBh
                                                                                  call 00007FAD1087D826h
                                                                                  call 00007FAD1087D98Dh
                                                                                  xor eax, eax
                                                                                  push ebp
                                                                                  push 0040ACC9h
                                                                                  push dword ptr fs:[eax]
                                                                                  mov dword ptr fs:[eax], esp
                                                                                  xor edx, edx
                                                                                  push ebp
                                                                                  push 0040AC92h
                                                                                  push dword ptr fs:[edx]
                                                                                  mov dword ptr fs:[edx], esp
                                                                                  mov eax, dword ptr [0040C014h]
                                                                                  call 00007FAD1087E43Bh
                                                                                  call 00007FAD1087E026h
                                                                                  cmp byte ptr [0040B234h], 00000000h
                                                                                  je 00007FAD1087EF1Eh
                                                                                  call 00007FAD1087E538h
                                                                                  xor eax, eax
                                                                                  call 00007FAD108786D9h
                                                                                  lea edx, dword ptr [ebp-10h]
                                                                                  xor eax, eax
                                                                                  call 00007FAD1087B4CBh
                                                                                  mov edx, dword ptr [ebp-10h]
                                                                                  mov eax, 0040CE28h
                                                                                  call 00007FAD10877A7Ah
                                                                                  push 00000002h
                                                                                  push 00000000h
                                                                                  push 00000001h
                                                                                  mov ecx, dword ptr [0040CE28h]
                                                                                  mov dl, 01h
                                                                                  mov eax, 0040738Ch
                                                                                  call 00007FAD1087BD5Ah
                                                                                  mov dword ptr [0040CE2Ch], eax
                                                                                  xor edx, edx
                                                                                  push ebp
                                                                                  push 0040AC4Ah
                                                                                  push dword ptr fs:[edx]
                                                                                  mov dword ptr fs:[edx], esp
                                                                                  call 00007FAD1087E496h
                                                                                  mov dword ptr [0040CE34h], eax
                                                                                  mov eax, dword ptr [0040CE34h]
                                                                                  cmp dword ptr [eax+0Ch], 00000000h
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xd0000x950.idata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x110000x2c00.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0xf0000x18.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  CODE0x10000x9d300x9e00c3bd95c4b1a8e5199981e0d9b45fd18cFalse0.6052709651898734data6.631765876950794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  DATA0xb0000x2500x4001ee71d84f1c77af85f1f5c278f880572False0.306640625data2.751820662285145IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  BSS0xc0000xe8c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .idata0xd0000x9500xa00bb5485bf968b970e5ea81292af2acdbaFalse0.414453125data4.430733069799036IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .tls0xe0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .rdata0xf0000x180x2009ba824905bf9c7922b6fc87a38b74366False0.052734375data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x100000x8c40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0x110000x2c000x2c0016770d5de6055c5a457207bd5a6d41c0False0.3251065340909091data4.490244109964198IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_ICON0x113540x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                                  RT_ICON0x1147c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                                  RT_ICON0x119e40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                                  RT_ICON0x11ccc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                                  RT_STRING0x125740x2f2data0.35543766578249336
                                                                                  RT_STRING0x128680x30cdata0.3871794871794872
                                                                                  RT_STRING0x12b740x2cedata0.42618384401114207
                                                                                  RT_STRING0x12e440x68data0.75
                                                                                  RT_STRING0x12eac0xb4data0.6277777777777778
                                                                                  RT_STRING0x12f600xaedata0.5344827586206896
                                                                                  RT_RCDATA0x130100x2cdata1.1590909090909092
                                                                                  RT_GROUP_ICON0x1303c0x3edataEnglishUnited States0.8387096774193549
                                                                                  RT_VERSION0x1307c0x4f4dataEnglishUnited States0.2586750788643533
                                                                                  RT_MANIFEST0x135700x5a4XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.42590027700831024
                                                                                  DLLImport
                                                                                  kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, WideCharToMultiByte, TlsSetValue, TlsGetValue, MultiByteToWideChar, GetModuleHandleA, GetLastError, GetCommandLineA, WriteFile, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetSystemTime, GetFileType, ExitProcess, CreateFileA, CloseHandle
                                                                                  user32.dllMessageBoxA
                                                                                  oleaut32.dllVariantChangeTypeEx, VariantCopyInd, VariantClear, SysStringLen, SysAllocStringLen
                                                                                  advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey, OpenProcessToken, LookupPrivilegeValueA
                                                                                  kernel32.dllWriteFile, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, Sleep, SizeofResource, SetLastError, SetFilePointer, SetErrorMode, SetEndOfFile, RemoveDirectoryA, ReadFile, LockResource, LoadResource, LoadLibraryA, IsDBCSLeadByte, GetWindowsDirectoryA, GetVersionExA, GetUserDefaultLangID, GetSystemInfo, GetSystemDefaultLCID, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetFullPathNameA, GetFileSize, GetFileAttributesA, GetExitCodeProcess, GetEnvironmentVariableA, GetCurrentProcess, GetCommandLineA, GetACP, InterlockedExchange, FormatMessageA, FindResourceA, DeleteFileA, CreateProcessA, CreateFileA, CreateDirectoryA, CloseHandle
                                                                                  user32.dllTranslateMessage, SetWindowLongA, PeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, ExitWindowsEx, DispatchMessageA, DestroyWindow, CreateWindowExA, CallWindowProcA, CharPrevA
                                                                                  comctl32.dllInitCommonControls
                                                                                  advapi32.dllAdjustTokenPrivileges
                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  DutchNetherlands
                                                                                  EnglishUnited States
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-12-23T09:23:02.315472+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549954188.119.66.185443TCP
                                                                                  2024-12-23T09:23:02.996132+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549954188.119.66.185443TCP
                                                                                  2024-12-23T09:24:04.653792+01002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.549977188.119.66.185443TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Dec 23, 2024 09:23:00.850425005 CET49954443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:23:00.850485086 CET44349954188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:23:00.850570917 CET49954443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:23:00.860574961 CET49954443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:23:00.860591888 CET44349954188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:23:02.315309048 CET44349954188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:23:02.315471888 CET49954443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:23:02.369774103 CET49954443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:23:02.369810104 CET44349954188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:23:02.370151043 CET44349954188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:23:02.370747089 CET49954443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:23:02.372817993 CET49954443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:23:02.415379047 CET44349954188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:23:02.996170998 CET44349954188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:23:02.996252060 CET44349954188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:23:02.996542931 CET49954443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:23:02.998059034 CET49954443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:23:02.998104095 CET44349954188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:24:03.010658026 CET49977443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:24:03.010759115 CET44349977188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:24:03.010893106 CET49977443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:24:03.011332035 CET49977443192.168.2.5188.119.66.185
                                                                                  Dec 23, 2024 09:24:03.011367083 CET44349977188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:24:04.653726101 CET44349977188.119.66.185192.168.2.5
                                                                                  Dec 23, 2024 09:24:04.653791904 CET49977443192.168.2.5188.119.66.185
                                                                                  • 188.119.66.185
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.549954188.119.66.1854436540C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-12-23 08:23:02 UTC283OUTGET /ai/?key=8f3f2b3ae115416b731ce2a8231e72eee7c4db7e40b82a8dcd6c946851e300888b3250aa15d005633775b0e650f3ba1e9c95b1c92975ccf55bc592fe5a818ece02a1b7e2984c57cad7021dda3a201bd23184 HTTP/1.1
                                                                                  User-Agent: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)
                                                                                  Host: 188.119.66.185
                                                                                  2024-12-23 08:23:02 UTC200INHTTP/1.1 200 OK
                                                                                  Server: nginx/1.18.0 (Ubuntu)
                                                                                  Date: Mon, 23 Dec 2024 08:23:02 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  X-Powered-By: PHP/7.4.33
                                                                                  2024-12-23 08:23:02 UTC24INData Raw: 65 0d 0a 38 62 37 32 33 36 36 33 65 63 31 33 32 35 0d 0a 30 0d 0a 0d 0a
                                                                                  Data Ascii: e8b723663ec13250


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:03:20:56
                                                                                  Start date:23/12/2024
                                                                                  Path:C:\Users\user\Desktop\vwZcJ81cpN.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\vwZcJ81cpN.exe"
                                                                                  Imagebase:0x400000
                                                                                  File size:3'351'818 bytes
                                                                                  MD5 hash:8D647E31E2E4241606104564B0EFA364
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Target ID:1
                                                                                  Start time:03:20:56
                                                                                  Start date:23/12/2024
                                                                                  Path:C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\is-5ADV6.tmp\vwZcJ81cpN.tmp" /SL5="$20436,3102839,56832,C:\Users\user\Desktop\vwZcJ81cpN.exe"
                                                                                  Imagebase:0x400000
                                                                                  File size:706'560 bytes
                                                                                  MD5 hash:397E7773A205B3947EEE196EA2F624B9
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Antivirus matches:
                                                                                  • Detection: 4%, ReversingLabs
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Target ID:3
                                                                                  Start time:03:20:57
                                                                                  Start date:23/12/2024
                                                                                  Path:C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe" -i
                                                                                  Imagebase:0x400000
                                                                                  File size:3'148'960 bytes
                                                                                  MD5 hash:8FB49FA4DAF45523188E06A18EB4B95A
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000003.00000000.2081108868.0000000000401000.00000020.00000001.01000000.00000009.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.3932286201.0000000002CD1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Socks5Systemz, Description: Yara detected Socks5Systemz, Source: 00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe, Author: Joe Security
                                                                                  Antivirus matches:
                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                  • Detection: 52%, ReversingLabs
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:21.3%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:2.4%
                                                                                    Total number of Nodes:1520
                                                                                    Total number of Limit Nodes:22
                                                                                    execution_graph 5460 407548 5461 407554 CloseHandle 5460->5461 5462 40755d 5460->5462 5461->5462 6697 402b48 RaiseException 5902 407749 5903 4076dc WriteFile 5902->5903 5912 407724 5902->5912 5904 4076e8 5903->5904 5905 4076ef 5903->5905 5906 40748c 35 API calls 5904->5906 5907 407700 5905->5907 5908 4073ec 34 API calls 5905->5908 5906->5905 5908->5907 5909 4078db InterlockedExchange 5910 4078e7 5909->5910 5911 4077e0 5911->5909 5913 407890 5911->5913 5912->5902 5912->5911 6698 40294a 6699 402952 6698->6699 6700 403554 4 API calls 6699->6700 6701 402967 6699->6701 6700->6699 6702 403f4a 6703 403f53 6702->6703 6704 403f5c 6702->6704 6706 403f07 6703->6706 6707 403f09 6706->6707 6708 403e9c 6707->6708 6712 403154 4 API calls 6707->6712 6718 403f3d 6707->6718 6729 403e9c 6707->6729 6709 403f3c 6708->6709 6711 403ef2 6708->6711 6713 403ea9 6708->6713 6720 403e8e 6708->6720 6709->6704 6716 402674 4 API calls 6711->6716 6712->6707 6714 403ecf 6713->6714 6719 402674 4 API calls 6713->6719 6714->6704 6716->6714 6718->6704 6719->6714 6721 403e4c 6720->6721 6722 403e62 6721->6722 6723 403e7b 6721->6723 6725 403e67 6721->6725 6724 403cc8 4 API calls 6722->6724 6726 402674 4 API calls 6723->6726 6724->6725 6727 403e78 6725->6727 6728 402674 4 API calls 6725->6728 6726->6727 6727->6711 6727->6713 6728->6727 6730 403ed7 6729->6730 6736 403ea9 6729->6736 6731 403ef2 6730->6731 6732 403e8e 4 API calls 6730->6732 6733 402674 4 API calls 6731->6733 6735 403ee6 6732->6735 6734 403ecf 6733->6734 6734->6707 6735->6731 6735->6736 6736->6734 6737 402674 4 API calls 6736->6737 6737->6734 6256 40ac4f 6257 40abc1 6256->6257 6258 4094d8 9 API calls 6257->6258 6260 40abed 6257->6260 6258->6260 6259 40ac06 6261 40ac1a 6259->6261 6262 40ac0f DestroyWindow 6259->6262 6260->6259 6263 40ac00 RemoveDirectoryA 6260->6263 6264 40ac42 6261->6264 6265 40357c 4 API calls 6261->6265 6262->6261 6263->6259 6266 40ac38 6265->6266 6267 4025ac 4 API calls 6266->6267 6267->6264 6268 403a52 6269 403a74 6268->6269 6270 403a5a WriteFile 6268->6270 6270->6269 6271 403a78 GetLastError 6270->6271 6271->6269 6272 402654 6273 403154 4 API calls 6272->6273 6274 402614 6273->6274 6275 402632 6274->6275 6276 403154 4 API calls 6274->6276 6275->6275 6276->6275 6277 40ac56 6278 40ac5d 6277->6278 6280 40ac88 6277->6280 6287 409448 6278->6287 6282 403198 4 API calls 6280->6282 6281 40ac62 6281->6280 6284 40ac80 MessageBoxA 6281->6284 6283 40acc0 6282->6283 6285 403198 4 API calls 6283->6285 6284->6280 6286 40acc8 6285->6286 6288 409454 GetCurrentProcess OpenProcessToken 6287->6288 6289 4094af ExitWindowsEx 6287->6289 6290 409466 6288->6290 6291 40946a LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6288->6291 6289->6290 6290->6281 6291->6289 6291->6290 6746 40995e 6747 409960 6746->6747 6748 409982 6747->6748 6749 40999e CallWindowProcA 6747->6749 6749->6748 6750 409960 6751 40996f 6750->6751 6752 409982 6750->6752 6751->6752 6753 40999e CallWindowProcA 6751->6753 6753->6752 6754 405160 6755 405173 6754->6755 6756 404e58 33 API calls 6755->6756 6757 405187 6756->6757 6292 402e64 6293 402e69 6292->6293 6294 402e7a RtlUnwind 6293->6294 6295 402e5e 6293->6295 6296 402e9d 6294->6296 5914 40766c SetFilePointer 5915 4076a3 5914->5915 5916 407693 GetLastError 5914->5916 5916->5915 5917 40769c 5916->5917 5918 40748c 35 API calls 5917->5918 5918->5915 6309 40667c IsDBCSLeadByte 6310 406694 6309->6310 6770 403f7d 6771 403fa2 6770->6771 6774 403f84 6770->6774 6773 403e8e 4 API calls 6771->6773 6771->6774 6772 403f8c 6773->6774 6774->6772 6775 402674 4 API calls 6774->6775 6776 403fca 6775->6776 6777 403d02 6779 403d12 6777->6779 6778 403ddf ExitProcess 6779->6778 6780 403db8 6779->6780 6782 403dea 6779->6782 6786 403da4 6779->6786 6787 403d8f MessageBoxA 6779->6787 6781 403cc8 4 API calls 6780->6781 6783 403dc2 6781->6783 6784 403cc8 4 API calls 6783->6784 6785 403dcc 6784->6785 6797 4019dc 6785->6797 6793 403fe4 6786->6793 6787->6780 6790 403dd1 6790->6778 6790->6782 6794 403fe8 6793->6794 6795 403f07 4 API calls 6794->6795 6796 404006 6795->6796 6798 401abb 6797->6798 6799 4019ed 6797->6799 6798->6790 6800 401a04 RtlEnterCriticalSection 6799->6800 6801 401a0e LocalFree 6799->6801 6800->6801 6802 401a41 6801->6802 6803 401a2f VirtualFree 6802->6803 6804 401a49 6802->6804 6803->6802 6805 401a70 LocalFree 6804->6805 6806 401a87 6804->6806 6805->6805 6805->6806 6807 401aa9 RtlDeleteCriticalSection 6806->6807 6808 401a9f RtlLeaveCriticalSection 6806->6808 6807->6790 6808->6807 6315 404206 6316 4041cc 6315->6316 6317 40420a 6315->6317 6318 404282 6317->6318 6319 403154 4 API calls 6317->6319 6320 404323 6319->6320 6321 402c08 6322 402c82 6321->6322 6325 402c19 6321->6325 6323 402c56 RtlUnwind 6324 403154 4 API calls 6323->6324 6324->6322 6325->6322 6325->6323 6328 402b28 6325->6328 6329 402b31 RaiseException 6328->6329 6330 402b47 6328->6330 6329->6330 6330->6323 6331 408c10 6332 408c17 6331->6332 6333 403198 4 API calls 6332->6333 6339 408cb1 6333->6339 6334 408cdc 6335 4031b8 4 API calls 6334->6335 6336 408d69 6335->6336 6337 408cc8 6340 4032fc 18 API calls 6337->6340 6338 403278 18 API calls 6338->6339 6339->6334 6339->6337 6339->6338 6341 4032fc 18 API calls 6339->6341 6340->6334 6341->6339 6346 40a814 6347 40a839 6346->6347 6348 40993c 29 API calls 6347->6348 6351 40a83e 6348->6351 6349 40a891 6380 4026c4 GetSystemTime 6349->6380 6351->6349 6354 408dd8 18 API calls 6351->6354 6352 40a896 6353 409330 46 API calls 6352->6353 6355 40a89e 6353->6355 6356 40a86d 6354->6356 6357 4031e8 18 API calls 6355->6357 6360 40a875 MessageBoxA 6356->6360 6358 40a8ab 6357->6358 6359 406928 19 API calls 6358->6359 6361 40a8b8 6359->6361 6360->6349 6362 40a882 6360->6362 6363 4066c0 19 API calls 6361->6363 6364 405864 19 API calls 6362->6364 6365 40a8c8 6363->6365 6364->6349 6366 406638 19 API calls 6365->6366 6367 40a8d9 6366->6367 6368 403340 18 API calls 6367->6368 6369 40a8e7 6368->6369 6370 4031e8 18 API calls 6369->6370 6371 40a8f7 6370->6371 6372 4074e0 37 API calls 6371->6372 6373 40a936 6372->6373 6374 402594 18 API calls 6373->6374 6375 40a956 6374->6375 6376 407a28 19 API calls 6375->6376 6377 40a998 6376->6377 6378 407cb8 35 API calls 6377->6378 6379 40a9bf 6378->6379 6380->6352 5458 407017 5459 407008 SetErrorMode 5458->5459 6381 403018 6382 403070 6381->6382 6383 403025 6381->6383 6384 40302a RtlUnwind 6383->6384 6385 40304e 6384->6385 6387 402f78 6385->6387 6388 402be8 6385->6388 6389 402bf1 RaiseException 6388->6389 6390 402c04 6388->6390 6389->6390 6390->6382 6395 40901e 6396 409010 6395->6396 6397 408fac Wow64RevertWow64FsRedirection 6396->6397 6398 409018 6397->6398 6399 409020 SetLastError 6400 409029 6399->6400 6415 403a28 ReadFile 6416 403a46 6415->6416 6417 403a49 GetLastError 6415->6417 5919 40762c ReadFile 5920 407663 5919->5920 5921 40764c 5919->5921 5922 407652 GetLastError 5921->5922 5923 40765c 5921->5923 5922->5920 5922->5923 5924 40748c 35 API calls 5923->5924 5924->5920 6819 40712e 6820 407118 6819->6820 6821 403198 4 API calls 6820->6821 6822 407120 6821->6822 6823 403198 4 API calls 6822->6823 6824 407128 6823->6824 5939 40a82f 5940 409ae8 18 API calls 5939->5940 5941 40a834 5940->5941 5942 40a839 5941->5942 5943 402f24 5 API calls 5941->5943 5976 40993c 5942->5976 5943->5942 5945 40a891 5981 4026c4 GetSystemTime 5945->5981 5947 40a83e 5947->5945 6042 408dd8 5947->6042 5948 40a896 5982 409330 5948->5982 5952 40a86d 5956 40a875 MessageBoxA 5952->5956 5953 4031e8 18 API calls 5954 40a8ab 5953->5954 6000 406928 5954->6000 5956->5945 5958 40a882 5956->5958 6045 405864 5958->6045 5963 40a8d9 6027 403340 5963->6027 5965 40a8e7 5966 4031e8 18 API calls 5965->5966 5967 40a8f7 5966->5967 5968 4074e0 37 API calls 5967->5968 5969 40a936 5968->5969 5970 402594 18 API calls 5969->5970 5971 40a956 5970->5971 5972 407a28 19 API calls 5971->5972 5973 40a998 5972->5973 5974 407cb8 35 API calls 5973->5974 5975 40a9bf 5974->5975 6049 40953c 5976->6049 5979 4098cc 19 API calls 5980 40995c 5979->5980 5980->5947 5981->5948 5984 409350 5982->5984 5986 409375 CreateDirectoryA 5984->5986 5991 408dd8 18 API calls 5984->5991 5993 404c94 33 API calls 5984->5993 5996 407284 19 API calls 5984->5996 5998 408da8 18 API calls 5984->5998 5999 405890 18 API calls 5984->5999 6105 406cf4 5984->6105 6128 409224 5984->6128 5987 4093ed 5986->5987 5988 40937f GetLastError 5986->5988 5989 40322c 4 API calls 5987->5989 5988->5984 5990 4093f7 5989->5990 5992 4031b8 4 API calls 5990->5992 5991->5984 5994 409411 5992->5994 5993->5984 5995 4031b8 4 API calls 5994->5995 5997 40941e 5995->5997 5996->5984 5997->5953 5998->5984 5999->5984 6234 406820 6000->6234 6003 403454 18 API calls 6004 40694a 6003->6004 6005 4066c0 6004->6005 6239 4068e4 6005->6239 6008 4066f0 6010 403340 18 API calls 6008->6010 6009 4066fe 6011 403454 18 API calls 6009->6011 6014 4066fc 6010->6014 6012 406711 6011->6012 6013 403340 18 API calls 6012->6013 6013->6014 6015 403198 4 API calls 6014->6015 6016 406733 6015->6016 6017 406638 6016->6017 6018 406642 6017->6018 6019 406665 6017->6019 6245 406950 6018->6245 6020 40322c 4 API calls 6019->6020 6022 40666e 6020->6022 6022->5963 6023 406649 6023->6019 6024 406654 6023->6024 6025 403340 18 API calls 6024->6025 6026 406662 6025->6026 6026->5963 6028 403344 6027->6028 6029 4033a5 6027->6029 6030 4031e8 6028->6030 6031 40334c 6028->6031 6036 403254 18 API calls 6030->6036 6037 4031fc 6030->6037 6031->6029 6033 40335b 6031->6033 6034 4031e8 18 API calls 6031->6034 6032 403228 6032->5965 6035 403254 18 API calls 6033->6035 6034->6033 6039 403375 6035->6039 6036->6037 6037->6032 6038 4025ac 4 API calls 6037->6038 6038->6032 6040 4031e8 18 API calls 6039->6040 6041 4033a1 6040->6041 6041->5965 6043 408da8 18 API calls 6042->6043 6044 408df4 6043->6044 6044->5952 6046 405869 6045->6046 6047 405940 19 API calls 6046->6047 6048 40587b 6047->6048 6048->6048 6056 40955b 6049->6056 6050 409590 6052 40959d GetUserDefaultLangID 6050->6052 6057 409592 6050->6057 6051 409594 6061 407024 GetModuleHandleA GetProcAddress 6051->6061 6052->6057 6055 40956f 6055->5979 6056->6050 6056->6051 6056->6055 6057->6055 6058 4095cb GetACP 6057->6058 6059 4095ef 6057->6059 6058->6055 6058->6057 6059->6055 6060 409615 GetACP 6059->6060 6060->6055 6060->6059 6062 407067 6061->6062 6063 40705e 6061->6063 6064 407070 6062->6064 6065 4070a8 6062->6065 6072 403198 4 API calls 6063->6072 6082 406f68 6064->6082 6066 406f68 RegOpenKeyExA 6065->6066 6070 4070c1 6066->6070 6068 407089 6069 4070de 6068->6069 6085 406f5c 6068->6085 6074 40322c 4 API calls 6069->6074 6070->6069 6073 406f5c 20 API calls 6070->6073 6076 407120 6072->6076 6077 4070d5 RegCloseKey 6073->6077 6078 4070eb 6074->6078 6079 403198 4 API calls 6076->6079 6077->6069 6080 4032fc 18 API calls 6078->6080 6081 407128 6079->6081 6080->6063 6081->6057 6083 406f73 6082->6083 6084 406f79 RegOpenKeyExA 6082->6084 6083->6084 6084->6068 6088 406e10 6085->6088 6089 406e36 RegQueryValueExA 6088->6089 6090 406e7b 6089->6090 6095 406e59 6089->6095 6091 403198 4 API calls 6090->6091 6094 406f47 RegCloseKey 6091->6094 6092 406e73 6093 403198 4 API calls 6092->6093 6093->6090 6094->6069 6095->6090 6095->6092 6096 403278 18 API calls 6095->6096 6097 403420 18 API calls 6095->6097 6096->6095 6098 406eb0 RegQueryValueExA 6097->6098 6098->6089 6099 406ecc 6098->6099 6099->6090 6100 4034f0 18 API calls 6099->6100 6101 406f0e 6100->6101 6102 406f20 6101->6102 6104 403420 18 API calls 6101->6104 6103 4031e8 18 API calls 6102->6103 6103->6090 6104->6102 6147 406a58 6105->6147 6108 406d26 6110 406a58 19 API calls 6108->6110 6113 406d72 6108->6113 6111 406d36 6110->6111 6112 406d42 6111->6112 6114 406a34 21 API calls 6111->6114 6112->6113 6115 406d67 6112->6115 6117 406a58 19 API calls 6112->6117 6155 406888 6113->6155 6114->6112 6115->6113 6167 406cc8 GetWindowsDirectoryA 6115->6167 6121 406d5b 6117->6121 6120 406638 19 API calls 6122 406d87 6120->6122 6121->6115 6124 406a34 21 API calls 6121->6124 6123 40322c 4 API calls 6122->6123 6125 406d91 6123->6125 6124->6115 6126 4031b8 4 API calls 6125->6126 6127 406dab 6126->6127 6127->5984 6129 409244 6128->6129 6130 406638 19 API calls 6129->6130 6131 40925d 6130->6131 6132 40322c 4 API calls 6131->6132 6135 409268 6132->6135 6134 406978 20 API calls 6134->6135 6135->6134 6136 4033b4 18 API calls 6135->6136 6137 408dd8 18 API calls 6135->6137 6138 405890 18 API calls 6135->6138 6140 4092e4 6135->6140 6207 4091b0 6135->6207 6215 409034 6135->6215 6136->6135 6137->6135 6138->6135 6141 40322c 4 API calls 6140->6141 6142 4092ef 6141->6142 6143 4031b8 4 API calls 6142->6143 6144 409309 6143->6144 6145 403198 4 API calls 6144->6145 6146 409311 6145->6146 6146->5984 6148 4034f0 18 API calls 6147->6148 6150 406a6b 6148->6150 6149 406a82 GetEnvironmentVariableA 6149->6150 6151 406a8e 6149->6151 6150->6149 6154 406a95 6150->6154 6169 406dec 6150->6169 6152 403198 4 API calls 6151->6152 6152->6154 6154->6108 6164 406a34 6154->6164 6156 403414 6155->6156 6157 4068ab GetFullPathNameA 6156->6157 6158 4068b7 6157->6158 6159 4068ce 6157->6159 6158->6159 6160 4068bf 6158->6160 6161 40322c 4 API calls 6159->6161 6162 403278 18 API calls 6160->6162 6163 4068cc 6161->6163 6162->6163 6163->6120 6173 4069dc 6164->6173 6168 406ce9 6167->6168 6168->6113 6170 406dfa 6169->6170 6171 4034f0 18 API calls 6170->6171 6172 406e08 6171->6172 6172->6150 6180 406978 6173->6180 6175 4069fe 6176 406a06 GetFileAttributesA 6175->6176 6177 406a1b 6176->6177 6178 403198 4 API calls 6177->6178 6179 406a23 6178->6179 6179->6108 6190 406744 6180->6190 6182 4069b0 6185 4069c6 6182->6185 6186 4069bb 6182->6186 6184 406989 6184->6182 6197 406970 CharPrevA 6184->6197 6198 403454 6185->6198 6187 40322c 4 API calls 6186->6187 6189 4069c4 6187->6189 6189->6175 6191 406755 6190->6191 6192 4067b9 6191->6192 6196 406773 6191->6196 6193 406680 IsDBCSLeadByte 6192->6193 6194 4067b4 6192->6194 6193->6194 6194->6184 6196->6194 6205 406680 IsDBCSLeadByte 6196->6205 6197->6184 6199 403486 6198->6199 6200 403459 6198->6200 6201 403198 4 API calls 6199->6201 6200->6199 6203 40346d 6200->6203 6202 40347c 6201->6202 6202->6189 6204 403278 18 API calls 6203->6204 6204->6202 6206 406694 6205->6206 6206->6196 6208 403198 4 API calls 6207->6208 6210 4091d1 6208->6210 6212 4091fe 6210->6212 6224 4032a8 6210->6224 6227 403494 6210->6227 6213 403198 4 API calls 6212->6213 6214 409213 6213->6214 6214->6135 6216 408f70 2 API calls 6215->6216 6217 40904a 6216->6217 6218 40904e 6217->6218 6231 406a48 6217->6231 6218->6135 6221 409081 6222 408fac Wow64RevertWow64FsRedirection 6221->6222 6223 409089 6222->6223 6223->6135 6225 403278 18 API calls 6224->6225 6226 4032b5 6225->6226 6226->6210 6228 403498 6227->6228 6230 4034c3 6227->6230 6229 4034f0 18 API calls 6228->6229 6229->6230 6230->6210 6232 4069dc 21 API calls 6231->6232 6233 406a52 GetLastError 6232->6233 6233->6221 6235 406744 IsDBCSLeadByte 6234->6235 6237 406835 6235->6237 6236 40687f 6236->6003 6237->6236 6238 406680 IsDBCSLeadByte 6237->6238 6238->6237 6240 4068f3 6239->6240 6241 406820 IsDBCSLeadByte 6240->6241 6244 4068fe 6241->6244 6242 4066ea 6242->6008 6242->6009 6243 406680 IsDBCSLeadByte 6243->6244 6244->6242 6244->6243 6246 406957 6245->6246 6247 40695b 6245->6247 6246->6023 6250 406970 CharPrevA 6247->6250 6249 40696c 6249->6023 6250->6249 6825 408f30 6828 408dfc 6825->6828 6829 408e05 6828->6829 6830 403198 4 API calls 6829->6830 6831 408e13 6829->6831 6830->6829 6832 403932 6833 403924 6832->6833 6834 40374c VariantClear 6833->6834 6835 40392c 6834->6835 5395 4075c4 SetFilePointer 5396 4075f7 5395->5396 5397 4075e7 GetLastError 5395->5397 5397->5396 5398 4075f0 5397->5398 5400 40748c GetLastError 5398->5400 5403 4073ec 5400->5403 5404 407284 19 API calls 5403->5404 5405 407414 5404->5405 5406 407434 5405->5406 5407 405194 33 API calls 5405->5407 5408 405890 18 API calls 5406->5408 5407->5406 5409 407443 5408->5409 5410 403198 4 API calls 5409->5410 5411 407460 5410->5411 5411->5396 6426 4076c8 WriteFile 6427 4076e8 6426->6427 6428 4076ef 6426->6428 6429 40748c 35 API calls 6427->6429 6430 407700 6428->6430 6431 4073ec 34 API calls 6428->6431 6429->6428 6431->6430 6432 402ccc 6435 402cfe 6432->6435 6436 402cdd 6432->6436 6433 402d88 RtlUnwind 6434 403154 4 API calls 6433->6434 6434->6435 6436->6433 6436->6435 6437 402b28 RaiseException 6436->6437 6438 402d7f 6437->6438 6438->6433 6844 403fcd 6845 403f07 4 API calls 6844->6845 6846 403fd6 6845->6846 6847 403e9c 4 API calls 6846->6847 6848 403fe2 6847->6848 6445 4024d0 6446 4024e4 6445->6446 6447 4024e9 6445->6447 6450 401918 4 API calls 6446->6450 6448 402518 6447->6448 6449 40250e RtlEnterCriticalSection 6447->6449 6452 4024ed 6447->6452 6460 402300 6448->6460 6449->6448 6450->6447 6453 402525 6456 402581 6453->6456 6457 402577 RtlLeaveCriticalSection 6453->6457 6455 401fd4 14 API calls 6458 402531 6455->6458 6457->6456 6458->6453 6459 40215c 9 API calls 6458->6459 6459->6453 6461 402314 6460->6461 6463 4023b8 6461->6463 6465 402335 6461->6465 6462 402344 6462->6453 6462->6455 6463->6462 6464 401d80 9 API calls 6463->6464 6468 402455 6463->6468 6470 401e84 6463->6470 6464->6463 6465->6462 6467 401b74 9 API calls 6465->6467 6467->6462 6468->6462 6469 401d00 9 API calls 6468->6469 6469->6462 6475 401768 6470->6475 6472 401ea6 6472->6463 6473 401e99 6473->6472 6474 401dcc 9 API calls 6473->6474 6474->6472 6477 401787 6475->6477 6476 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 6476->6477 6477->6476 6478 40183b 6477->6478 6480 40132c LocalAlloc 6477->6480 6481 401821 6477->6481 6482 4017d6 6477->6482 6479 4015c4 VirtualAlloc 6478->6479 6483 4017e7 6478->6483 6479->6483 6480->6477 6484 40150c VirtualFree 6481->6484 6485 40150c VirtualFree 6482->6485 6483->6473 6484->6483 6485->6483 6486 4028d2 6487 4028da 6486->6487 6488 403554 4 API calls 6487->6488 6489 4028ef 6487->6489 6488->6487 6490 4025ac 4 API calls 6489->6490 6491 4028f4 6490->6491 6849 4019d3 6850 4019ba 6849->6850 6851 4019c3 RtlLeaveCriticalSection 6850->6851 6852 4019cd 6850->6852 6851->6852 5412 407fd4 5413 407fe6 5412->5413 5415 407fed 5412->5415 5423 407f10 5413->5423 5417 408017 5415->5417 5419 408015 5415->5419 5421 408021 5415->5421 5416 40804e 5434 407d7c 5417->5434 5418 407d7c 33 API calls 5418->5416 5437 407e2c 5419->5437 5421->5416 5421->5418 5424 407f25 5423->5424 5425 407d7c 33 API calls 5424->5425 5426 407f34 5424->5426 5425->5426 5427 407f6e 5426->5427 5428 407d7c 33 API calls 5426->5428 5429 407f82 5427->5429 5430 407d7c 33 API calls 5427->5430 5428->5427 5431 407fae 5429->5431 5444 407eb8 5429->5444 5430->5429 5431->5415 5447 4058c4 5434->5447 5436 407d9e 5436->5421 5438 405194 33 API calls 5437->5438 5439 407e57 5438->5439 5455 407de4 5439->5455 5441 407e5f 5442 403198 4 API calls 5441->5442 5443 407e74 5442->5443 5443->5421 5445 407ec7 VirtualFree 5444->5445 5446 407ed9 VirtualAlloc 5444->5446 5445->5446 5446->5431 5449 4058d0 5447->5449 5448 405194 33 API calls 5450 4058fd 5448->5450 5449->5448 5451 4031e8 18 API calls 5450->5451 5452 405908 5451->5452 5453 403198 4 API calls 5452->5453 5454 40591d 5453->5454 5454->5436 5456 4058c4 33 API calls 5455->5456 5457 407e06 5456->5457 5457->5441 6492 405ad4 6493 405adc 6492->6493 6495 405ae4 6492->6495 6494 405aeb 6493->6494 6496 405ae2 6493->6496 6497 405940 19 API calls 6494->6497 6499 405a4c 6496->6499 6497->6495 6500 405a54 6499->6500 6501 405a6e 6500->6501 6502 403154 4 API calls 6500->6502 6503 405a73 6501->6503 6504 405a8a 6501->6504 6502->6500 6506 405940 19 API calls 6503->6506 6505 403154 4 API calls 6504->6505 6507 405a8f 6505->6507 6508 405a86 6506->6508 6509 4059b0 33 API calls 6507->6509 6510 403154 4 API calls 6508->6510 6509->6508 6511 405ab8 6510->6511 6512 403154 4 API calls 6511->6512 6513 405ac6 6512->6513 6513->6495 5925 40a9de 5926 40aa03 5925->5926 5927 407918 InterlockedExchange 5926->5927 5928 40aa2d 5927->5928 5929 40aa3d 5928->5929 5930 409ae8 18 API calls 5928->5930 5935 4076ac SetEndOfFile 5929->5935 5930->5929 5932 40aa59 5933 4025ac 4 API calls 5932->5933 5934 40aa90 5933->5934 5936 4076c3 5935->5936 5937 4076bc 5935->5937 5936->5932 5938 40748c 35 API calls 5937->5938 5938->5936 6856 402be9 RaiseException 6857 402c04 6856->6857 6524 402af2 6525 402afe 6524->6525 6528 402ed0 6525->6528 6529 403154 4 API calls 6528->6529 6531 402ee0 6529->6531 6530 402b03 6531->6530 6533 402b0c 6531->6533 6534 402b25 6533->6534 6535 402b15 RaiseException 6533->6535 6534->6530 6535->6534 5463 40a5f8 5506 4030dc 5463->5506 5465 40a60e 5509 4042e8 5465->5509 5467 40a613 5512 40457c GetModuleHandleA GetProcAddress 5467->5512 5471 40a61d 5520 4065c8 5471->5520 5473 40a622 5529 4090a4 GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 5473->5529 5480 40a665 5551 406c2c 5480->5551 5484 4031e8 18 API calls 5485 40a683 5484->5485 5565 4074e0 5485->5565 5491 407918 InterlockedExchange 5494 40a6d2 5491->5494 5492 40a710 5585 4074a0 5492->5585 5494->5492 5622 409ae8 5494->5622 5495 40a751 5589 407a28 5495->5589 5496 40a736 5496->5495 5497 409ae8 18 API calls 5496->5497 5497->5495 5499 40a776 5599 408b08 5499->5599 5503 40a7bc 5504 408b08 35 API calls 5503->5504 5505 40a7f5 5503->5505 5504->5503 5632 403094 5506->5632 5508 4030e1 GetModuleHandleA GetCommandLineA 5508->5465 5510 403154 4 API calls 5509->5510 5511 404323 5509->5511 5510->5511 5511->5467 5513 404598 5512->5513 5514 40459f GetProcAddress 5512->5514 5513->5514 5515 4045b5 GetProcAddress 5514->5515 5516 4045ae 5514->5516 5517 4045c4 SetProcessDEPPolicy 5515->5517 5518 4045c8 5515->5518 5516->5515 5517->5518 5519 404624 6F541CD0 5518->5519 5519->5471 5633 405ca8 5520->5633 5530 4090f7 5529->5530 5717 406fa0 SetErrorMode 5530->5717 5533 407284 19 API calls 5534 409127 5533->5534 5535 403198 4 API calls 5534->5535 5536 40913c 5535->5536 5537 409b78 GetSystemInfo VirtualQuery 5536->5537 5538 409c2c 5537->5538 5541 409ba2 5537->5541 5543 409768 5538->5543 5539 409c0d VirtualQuery 5539->5538 5539->5541 5540 409bcc VirtualProtect 5540->5541 5541->5538 5541->5539 5541->5540 5542 409bfb VirtualProtect 5541->5542 5542->5539 5723 406bd0 GetCommandLineA 5543->5723 5545 409850 5547 4031b8 4 API calls 5545->5547 5546 406c2c 20 API calls 5550 409785 5546->5550 5548 40986a 5547->5548 5548->5480 5615 409c88 5548->5615 5549 403454 18 API calls 5549->5550 5550->5545 5550->5546 5550->5549 5552 406c53 GetModuleFileNameA 5551->5552 5553 406c77 GetCommandLineA 5551->5553 5554 403278 18 API calls 5552->5554 5561 406c7c 5553->5561 5555 406c75 5554->5555 5559 406ca4 5555->5559 5556 406c81 5557 403198 4 API calls 5556->5557 5560 406c89 5557->5560 5558 406af0 18 API calls 5558->5561 5562 403198 4 API calls 5559->5562 5563 40322c 4 API calls 5560->5563 5561->5556 5561->5558 5561->5560 5564 406cb9 5562->5564 5563->5559 5564->5484 5566 4074ea 5565->5566 5730 407576 5566->5730 5733 407578 5566->5733 5567 407516 5568 40752a 5567->5568 5569 40748c 35 API calls 5567->5569 5572 409c34 FindResourceA 5568->5572 5569->5568 5573 409c49 5572->5573 5574 409c4e SizeofResource 5572->5574 5575 409ae8 18 API calls 5573->5575 5576 409c60 LoadResource 5574->5576 5577 409c5b 5574->5577 5575->5574 5579 409c73 LockResource 5576->5579 5580 409c6e 5576->5580 5578 409ae8 18 API calls 5577->5578 5578->5576 5582 409c84 5579->5582 5583 409c7f 5579->5583 5581 409ae8 18 API calls 5580->5581 5581->5579 5582->5491 5582->5494 5584 409ae8 18 API calls 5583->5584 5584->5582 5586 4074b4 5585->5586 5587 4074c4 5586->5587 5588 4073ec 34 API calls 5586->5588 5587->5496 5588->5587 5590 407a35 5589->5590 5591 405890 18 API calls 5590->5591 5592 407a89 5590->5592 5591->5592 5593 407918 InterlockedExchange 5592->5593 5594 407a9b 5593->5594 5595 405890 18 API calls 5594->5595 5596 407ab1 5594->5596 5595->5596 5597 407af4 5596->5597 5598 405890 18 API calls 5596->5598 5597->5499 5598->5597 5600 408b39 5599->5600 5613 408b82 5599->5613 5602 407cb8 35 API calls 5600->5602 5605 4034f0 18 API calls 5600->5605 5608 4031e8 18 API calls 5600->5608 5610 403420 18 API calls 5600->5610 5600->5613 5601 408bcd 5736 407cb8 5601->5736 5602->5600 5604 408be4 5607 4031b8 4 API calls 5604->5607 5605->5600 5606 4034f0 18 API calls 5606->5613 5609 408bfe 5607->5609 5608->5600 5629 404c20 5609->5629 5610->5600 5611 403420 18 API calls 5611->5613 5612 4031e8 18 API calls 5612->5613 5613->5601 5613->5606 5613->5611 5613->5612 5614 407cb8 35 API calls 5613->5614 5614->5613 5616 40322c 4 API calls 5615->5616 5617 409cab 5616->5617 5618 409cba MessageBoxA 5617->5618 5619 409ccf 5618->5619 5620 403198 4 API calls 5619->5620 5621 409cd7 5620->5621 5621->5480 5623 409af1 5622->5623 5624 409b09 5622->5624 5625 405890 18 API calls 5623->5625 5626 405890 18 API calls 5624->5626 5627 409b03 5625->5627 5628 409b1a 5626->5628 5627->5492 5628->5492 5758 402594 5629->5758 5631 404c2b 5631->5503 5632->5508 5634 405940 19 API calls 5633->5634 5635 405cb9 5634->5635 5636 405280 GetSystemDefaultLCID 5635->5636 5637 4052b6 5636->5637 5638 4031e8 18 API calls 5637->5638 5639 404cdc 19 API calls 5637->5639 5640 40520c 19 API calls 5637->5640 5643 405318 5637->5643 5638->5637 5639->5637 5640->5637 5641 404cdc 19 API calls 5641->5643 5642 40520c 19 API calls 5642->5643 5643->5641 5643->5642 5644 4031e8 18 API calls 5643->5644 5645 40539b 5643->5645 5644->5643 5646 4031b8 4 API calls 5645->5646 5647 4053b5 5646->5647 5648 4053c4 GetSystemDefaultLCID 5647->5648 5705 40520c GetLocaleInfoA 5648->5705 5651 4031e8 18 API calls 5652 405404 5651->5652 5653 40520c 19 API calls 5652->5653 5654 405419 5653->5654 5655 40520c 19 API calls 5654->5655 5656 40543d 5655->5656 5711 405258 GetLocaleInfoA 5656->5711 5659 405258 GetLocaleInfoA 5660 40546d 5659->5660 5661 40520c 19 API calls 5660->5661 5662 405487 5661->5662 5663 405258 GetLocaleInfoA 5662->5663 5664 4054a4 5663->5664 5665 40520c 19 API calls 5664->5665 5666 4054be 5665->5666 5667 4031e8 18 API calls 5666->5667 5668 4054cb 5667->5668 5669 40520c 19 API calls 5668->5669 5670 4054e0 5669->5670 5671 4031e8 18 API calls 5670->5671 5672 4054ed 5671->5672 5673 405258 GetLocaleInfoA 5672->5673 5674 4054fb 5673->5674 5675 40520c 19 API calls 5674->5675 5676 405515 5675->5676 5677 4031e8 18 API calls 5676->5677 5678 405522 5677->5678 5679 40520c 19 API calls 5678->5679 5680 405537 5679->5680 5681 4031e8 18 API calls 5680->5681 5682 405544 5681->5682 5683 40520c 19 API calls 5682->5683 5684 405559 5683->5684 5685 405576 5684->5685 5686 405567 5684->5686 5688 40322c 4 API calls 5685->5688 5713 40322c 5686->5713 5689 405574 5688->5689 5690 40520c 19 API calls 5689->5690 5691 405598 5690->5691 5692 4055b5 5691->5692 5693 4055a6 5691->5693 5695 403198 4 API calls 5692->5695 5694 40322c 4 API calls 5693->5694 5696 4055b3 5694->5696 5695->5696 5697 4033b4 18 API calls 5696->5697 5698 4055d7 5697->5698 5699 4033b4 18 API calls 5698->5699 5700 4055f1 5699->5700 5701 4031b8 4 API calls 5700->5701 5702 40560b 5701->5702 5703 405cf4 GetVersionExA 5702->5703 5704 405d0b 5703->5704 5704->5473 5706 405233 5705->5706 5707 405245 5705->5707 5708 403278 18 API calls 5706->5708 5709 40322c 4 API calls 5707->5709 5710 405243 5708->5710 5709->5710 5710->5651 5712 405274 5711->5712 5712->5659 5714 403230 5713->5714 5715 403252 5714->5715 5716 4025ac 4 API calls 5714->5716 5715->5689 5716->5715 5721 403414 5717->5721 5720 406fee 5720->5533 5722 403418 LoadLibraryA 5721->5722 5722->5720 5724 406af0 18 API calls 5723->5724 5725 406bf3 5724->5725 5726 406c05 5725->5726 5727 406af0 18 API calls 5725->5727 5728 403198 4 API calls 5726->5728 5727->5725 5729 406c1a 5728->5729 5729->5550 5731 407578 5730->5731 5732 4075b7 CreateFileA 5731->5732 5732->5567 5734 403414 5733->5734 5735 4075b7 CreateFileA 5734->5735 5735->5567 5737 407cd3 5736->5737 5741 407cc8 5736->5741 5742 407c5c 5737->5742 5740 405890 18 API calls 5740->5741 5741->5604 5743 407c70 5742->5743 5744 407caf 5742->5744 5743->5744 5746 407bac 5743->5746 5744->5740 5744->5741 5747 407bb7 5746->5747 5748 407bc8 5746->5748 5749 405890 18 API calls 5747->5749 5750 4074a0 34 API calls 5748->5750 5749->5748 5751 407bdc 5750->5751 5752 4074a0 34 API calls 5751->5752 5753 407bfd 5752->5753 5754 407918 InterlockedExchange 5753->5754 5755 407c12 5754->5755 5756 407c28 5755->5756 5757 405890 18 API calls 5755->5757 5756->5743 5757->5756 5759 402598 5758->5759 5761 4025a2 5758->5761 5764 401fd4 5759->5764 5760 40259e 5760->5761 5762 403154 4 API calls 5760->5762 5761->5631 5761->5761 5762->5761 5765 401fe8 5764->5765 5766 401fed 5764->5766 5775 401918 RtlInitializeCriticalSection 5765->5775 5768 402012 RtlEnterCriticalSection 5766->5768 5769 40201c 5766->5769 5772 401ff1 5766->5772 5768->5769 5769->5772 5782 401ee0 5769->5782 5772->5760 5773 402147 5773->5760 5774 40213d RtlLeaveCriticalSection 5774->5773 5776 40193c RtlEnterCriticalSection 5775->5776 5777 401946 5775->5777 5776->5777 5778 401964 LocalAlloc 5777->5778 5779 40197e 5778->5779 5780 4019c3 RtlLeaveCriticalSection 5779->5780 5781 4019cd 5779->5781 5780->5781 5781->5766 5783 401ef0 5782->5783 5784 401f1c 5783->5784 5787 401f40 5783->5787 5788 401e58 5783->5788 5784->5787 5793 401d00 5784->5793 5787->5773 5787->5774 5797 4016d8 5788->5797 5791 401e75 5791->5783 5794 401d4e 5793->5794 5795 401d1e 5793->5795 5794->5795 5866 401c68 5794->5866 5795->5787 5798 4016f4 5797->5798 5800 4016fe 5798->5800 5802 40175b 5798->5802 5804 40174f 5798->5804 5814 401430 5798->5814 5826 40132c 5798->5826 5822 4015c4 5800->5822 5802->5791 5807 401dcc 5802->5807 5830 40150c 5804->5830 5805 40170a 5805->5802 5840 401d80 5807->5840 5810 40132c LocalAlloc 5811 401df0 5810->5811 5812 401df8 5811->5812 5844 401b44 5811->5844 5812->5791 5815 40143f VirtualAlloc 5814->5815 5817 40146c 5815->5817 5818 40148f 5815->5818 5834 4012e4 5817->5834 5818->5798 5821 40147c VirtualFree 5821->5818 5823 40160a 5822->5823 5824 401626 VirtualAlloc 5823->5824 5825 40163a 5823->5825 5824->5823 5824->5825 5825->5805 5827 401348 5826->5827 5828 4012e4 LocalAlloc 5827->5828 5829 40138f 5828->5829 5829->5798 5833 40153b 5830->5833 5831 401594 5831->5802 5832 401568 VirtualFree 5832->5833 5833->5831 5833->5832 5837 40128c 5834->5837 5838 401298 LocalAlloc 5837->5838 5839 4012aa 5837->5839 5838->5839 5839->5818 5839->5821 5841 401d92 5840->5841 5842 401d89 5840->5842 5841->5810 5842->5841 5849 401b74 5842->5849 5845 401b61 5844->5845 5846 401b52 5844->5846 5845->5812 5847 401d00 9 API calls 5846->5847 5848 401b5f 5847->5848 5848->5812 5852 40215c 5849->5852 5851 401b95 5851->5841 5853 402175 5852->5853 5857 40217a 5852->5857 5855 401918 4 API calls 5853->5855 5854 4021ab RtlEnterCriticalSection 5858 4021b5 5854->5858 5855->5857 5856 4021c1 5860 4022e3 RtlLeaveCriticalSection 5856->5860 5861 4022ed 5856->5861 5857->5854 5857->5858 5862 40217e 5857->5862 5858->5856 5859 402244 5858->5859 5864 402270 5858->5864 5859->5862 5863 401d80 7 API calls 5859->5863 5860->5861 5861->5851 5862->5851 5863->5862 5864->5856 5865 401d00 7 API calls 5864->5865 5865->5856 5867 401c7a 5866->5867 5868 401c9d 5867->5868 5869 401caf 5867->5869 5879 40188c 5868->5879 5871 40188c 3 API calls 5869->5871 5872 401cad 5871->5872 5873 401b44 9 API calls 5872->5873 5878 401cc5 5872->5878 5874 401cd4 5873->5874 5875 401cee 5874->5875 5889 401b98 5874->5889 5894 4013a0 5875->5894 5878->5795 5880 4018b2 5879->5880 5881 40190b 5879->5881 5898 401658 5880->5898 5881->5872 5884 40132c LocalAlloc 5885 4018cf 5884->5885 5886 4018e6 5885->5886 5887 40150c VirtualFree 5885->5887 5886->5881 5888 4013a0 LocalAlloc 5886->5888 5887->5886 5888->5881 5890 401bab 5889->5890 5891 401b9d 5889->5891 5890->5875 5892 401b74 9 API calls 5891->5892 5893 401baa 5892->5893 5893->5875 5895 4013ab 5894->5895 5896 4013c6 5895->5896 5897 4012e4 LocalAlloc 5895->5897 5896->5878 5897->5896 5900 40168f 5898->5900 5899 4016cf 5899->5884 5900->5899 5901 4016a9 VirtualFree 5900->5901 5901->5900 6858 402dfa 6859 402e26 6858->6859 6860 402e0d 6858->6860 6862 402ba4 6860->6862 6863 402bc9 6862->6863 6864 402bad 6862->6864 6863->6859 6865 402bb5 RaiseException 6864->6865 6865->6863 6866 4075fa GetFileSize 6867 407626 6866->6867 6868 407616 GetLastError 6866->6868 6868->6867 6869 40761f 6868->6869 6870 40748c 35 API calls 6869->6870 6870->6867 6871 406ffb 6872 407008 SetErrorMode 6871->6872 6540 403a80 CloseHandle 6541 403a90 6540->6541 6542 403a91 GetLastError 6540->6542 6543 404283 6544 4042c3 6543->6544 6545 403154 4 API calls 6544->6545 6546 404323 6545->6546 6873 404185 6874 4041ff 6873->6874 6875 4041cc 6874->6875 6876 403154 4 API calls 6874->6876 6877 404323 6876->6877 6547 403e87 6548 403e4c 6547->6548 6549 403e67 6548->6549 6550 403e62 6548->6550 6551 403e7b 6548->6551 6554 403e78 6549->6554 6560 402674 6549->6560 6556 403cc8 6550->6556 6553 402674 4 API calls 6551->6553 6553->6554 6557 403cd6 6556->6557 6558 402674 4 API calls 6557->6558 6559 403ceb 6557->6559 6558->6559 6559->6549 6561 403154 4 API calls 6560->6561 6562 40267a 6561->6562 6562->6554 6571 407e90 6572 407eb8 VirtualFree 6571->6572 6573 407e9d 6572->6573 6576 403e95 6577 403e4c 6576->6577 6578 403e67 6577->6578 6579 403e62 6577->6579 6580 403e7b 6577->6580 6583 403e78 6578->6583 6584 402674 4 API calls 6578->6584 6581 403cc8 4 API calls 6579->6581 6582 402674 4 API calls 6580->6582 6581->6578 6582->6583 6584->6583 6585 40ac97 6594 4096fc 6585->6594 6588 402f24 5 API calls 6589 40aca1 6588->6589 6590 403198 4 API calls 6589->6590 6591 40acc0 6590->6591 6592 403198 4 API calls 6591->6592 6593 40acc8 6592->6593 6603 4056ac 6594->6603 6596 409717 6597 409745 6596->6597 6609 40720c 6596->6609 6600 403198 4 API calls 6597->6600 6599 409735 6602 40973d MessageBoxA 6599->6602 6601 40975a 6600->6601 6601->6588 6601->6589 6602->6597 6604 403154 4 API calls 6603->6604 6605 4056b1 6604->6605 6606 4056c9 6605->6606 6607 403154 4 API calls 6605->6607 6606->6596 6608 4056bf 6607->6608 6608->6596 6610 4056ac 4 API calls 6609->6610 6611 40721b 6610->6611 6612 407221 6611->6612 6613 40722f 6611->6613 6614 40322c 4 API calls 6612->6614 6615 40723f 6613->6615 6617 40724b 6613->6617 6618 40722d 6614->6618 6620 4071d0 6615->6620 6627 4032b8 6617->6627 6618->6599 6621 40322c 4 API calls 6620->6621 6622 4071df 6621->6622 6623 4071fc 6622->6623 6624 406950 CharPrevA 6622->6624 6623->6618 6625 4071eb 6624->6625 6625->6623 6626 4032fc 18 API calls 6625->6626 6626->6623 6628 403278 18 API calls 6627->6628 6629 4032c2 6628->6629 6629->6618 6630 403a97 6631 403aac 6630->6631 6632 403bbc GetStdHandle 6631->6632 6633 403b0e CreateFileA 6631->6633 6641 403ab2 6631->6641 6634 403c17 GetLastError 6632->6634 6638 403bba 6632->6638 6633->6634 6635 403b2c 6633->6635 6634->6641 6637 403b3b GetFileSize 6635->6637 6635->6638 6637->6634 6639 403b4e SetFilePointer 6637->6639 6640 403be7 GetFileType 6638->6640 6638->6641 6639->6634 6644 403b6a ReadFile 6639->6644 6640->6641 6643 403c02 CloseHandle 6640->6643 6643->6641 6644->6634 6645 403b8c 6644->6645 6645->6638 6646 403b9f SetFilePointer 6645->6646 6646->6634 6647 403bb0 SetEndOfFile 6646->6647 6647->6634 6647->6638 6652 40aaa2 6653 40aad2 6652->6653 6654 40aadc CreateWindowExA SetWindowLongA 6653->6654 6655 405194 33 API calls 6654->6655 6656 40ab5f 6655->6656 6657 4032fc 18 API calls 6656->6657 6658 40ab6d 6657->6658 6659 4032fc 18 API calls 6658->6659 6660 40ab7a 6659->6660 6661 406b7c 19 API calls 6660->6661 6662 40ab86 6661->6662 6663 4032fc 18 API calls 6662->6663 6664 40ab8f 6663->6664 6665 4099ec 43 API calls 6664->6665 6666 40aba1 6665->6666 6667 4098cc 19 API calls 6666->6667 6668 40abb4 6666->6668 6667->6668 6669 40abed 6668->6669 6670 4094d8 9 API calls 6668->6670 6671 40ac06 6669->6671 6674 40ac00 RemoveDirectoryA 6669->6674 6670->6669 6672 40ac1a 6671->6672 6673 40ac0f DestroyWindow 6671->6673 6675 40ac42 6672->6675 6676 40357c 4 API calls 6672->6676 6673->6672 6674->6671 6677 40ac38 6676->6677 6678 4025ac 4 API calls 6677->6678 6678->6675 6890 405ba2 6892 405ba4 6890->6892 6891 405be0 6894 405940 19 API calls 6891->6894 6892->6891 6893 405bda 6892->6893 6895 405bf7 6892->6895 6893->6891 6896 405c4c 6893->6896 6897 405bf3 6894->6897 6899 404cdc 19 API calls 6895->6899 6898 4059b0 33 API calls 6896->6898 6900 403198 4 API calls 6897->6900 6898->6897 6901 405c20 6899->6901 6902 405c86 6900->6902 6903 4059b0 33 API calls 6901->6903 6903->6897 6904 408da4 6905 408dc8 6904->6905 6906 408c80 18 API calls 6905->6906 6907 408dd1 6906->6907 6679 402caa 6680 403154 4 API calls 6679->6680 6681 402caf 6680->6681 6922 4011aa 6923 4011ac GetStdHandle 6922->6923 6682 4028ac 6683 402594 18 API calls 6682->6683 6684 4028b6 6683->6684 4994 40aab4 4995 40aab8 SetLastError 4994->4995 5026 409648 GetLastError 4995->5026 4998 40aad2 5000 40aadc CreateWindowExA SetWindowLongA 4998->5000 5039 405194 5000->5039 5004 40ab6d 5005 4032fc 18 API calls 5004->5005 5006 40ab7a 5005->5006 5056 406b7c GetCommandLineA 5006->5056 5009 4032fc 18 API calls 5010 40ab8f 5009->5010 5061 4099ec 5010->5061 5012 40aba1 5014 40abb4 5012->5014 5082 4098cc 5012->5082 5015 40abd4 5014->5015 5016 40abed 5014->5016 5088 4094d8 5015->5088 5018 40ac06 5016->5018 5021 40ac00 RemoveDirectoryA 5016->5021 5019 40ac1a 5018->5019 5020 40ac0f DestroyWindow 5018->5020 5022 40ac42 5019->5022 5096 40357c 5019->5096 5020->5019 5021->5018 5024 40ac38 5109 4025ac 5024->5109 5113 404c94 5026->5113 5034 4096c3 5128 4031b8 5034->5128 5040 4051a8 33 API calls 5039->5040 5041 4051a3 5040->5041 5042 4032fc 5041->5042 5043 403300 5042->5043 5044 40333f 5042->5044 5045 4031e8 5043->5045 5046 40330a 5043->5046 5044->5004 5049 4031fc 5045->5049 5053 403254 18 API calls 5045->5053 5047 403334 5046->5047 5048 40331d 5046->5048 5052 4034f0 18 API calls 5047->5052 5289 4034f0 5048->5289 5050 403228 5049->5050 5054 4025ac 4 API calls 5049->5054 5050->5004 5055 403322 5052->5055 5053->5049 5054->5050 5055->5004 5315 406af0 5056->5315 5058 406ba1 5059 403198 4 API calls 5058->5059 5060 406bbf 5059->5060 5060->5009 5329 4033b4 5061->5329 5063 409a27 5064 409a59 CreateProcessA 5063->5064 5065 409a65 5064->5065 5066 409a6c CloseHandle 5064->5066 5067 409648 35 API calls 5065->5067 5068 409a75 5066->5068 5067->5066 5069 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5068->5069 5070 409a7a MsgWaitForMultipleObjects 5069->5070 5070->5068 5071 409a91 5070->5071 5072 4099c0 TranslateMessage DispatchMessageA PeekMessageA 5071->5072 5073 409a96 GetExitCodeProcess CloseHandle 5072->5073 5074 409ab6 5073->5074 5075 403198 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5074->5075 5076 409abe 5075->5076 5076->5012 5077 402f24 5078 403154 4 API calls 5077->5078 5079 402f29 5078->5079 5335 402bcc 5079->5335 5081 402f51 5081->5081 5083 40990e 5082->5083 5084 4098d4 5082->5084 5083->5014 5084->5083 5085 403420 18 API calls 5084->5085 5086 409908 5085->5086 5338 408e80 5086->5338 5089 409532 5088->5089 5093 4094eb 5088->5093 5089->5016 5090 4094f3 Sleep 5090->5093 5091 409503 Sleep 5091->5093 5093->5089 5093->5090 5093->5091 5094 40951a GetLastError 5093->5094 5361 408fbc 5093->5361 5094->5089 5095 409524 GetLastError 5094->5095 5095->5089 5095->5093 5097 403591 5096->5097 5098 4035a0 5096->5098 5101 4035d0 5097->5101 5102 40359b 5097->5102 5106 4035b6 5097->5106 5099 4035b1 5098->5099 5100 4035b8 5098->5100 5103 403198 4 API calls 5099->5103 5104 4031b8 4 API calls 5100->5104 5101->5106 5107 40357c 4 API calls 5101->5107 5102->5098 5105 4035ec 5102->5105 5103->5106 5104->5106 5105->5106 5378 403554 5105->5378 5106->5024 5107->5101 5110 4025b0 5109->5110 5111 4025ba 5109->5111 5110->5111 5112 403154 4 API calls 5110->5112 5111->5022 5111->5111 5112->5111 5136 4051a8 5113->5136 5116 407284 FormatMessageA 5117 4072aa 5116->5117 5118 403278 18 API calls 5117->5118 5119 4072c7 5118->5119 5120 408da8 5119->5120 5121 408dc8 5120->5121 5279 408c80 5121->5279 5124 405890 5125 405897 5124->5125 5126 4031e8 18 API calls 5125->5126 5127 4058af 5126->5127 5127->5034 5130 4031be 5128->5130 5129 4031e3 5132 403198 5129->5132 5130->5129 5131 4025ac 4 API calls 5130->5131 5131->5130 5133 4031b7 5132->5133 5134 40319e 5132->5134 5133->4998 5133->5077 5134->5133 5135 4025ac 4 API calls 5134->5135 5135->5133 5137 4051c5 5136->5137 5144 404e58 5137->5144 5140 4051f1 5149 403278 5140->5149 5146 404e73 5144->5146 5145 404e85 5145->5140 5154 404be4 5145->5154 5146->5145 5157 404f7a 5146->5157 5164 404e4c 5146->5164 5150 403254 18 API calls 5149->5150 5151 403288 5150->5151 5152 403198 4 API calls 5151->5152 5153 4032a0 5152->5153 5153->5116 5271 405940 5154->5271 5156 404bf5 5156->5140 5158 404f8b 5157->5158 5161 404fd9 5157->5161 5160 40505f 5158->5160 5158->5161 5163 404ff7 5160->5163 5171 404e38 5160->5171 5161->5163 5167 404df4 5161->5167 5163->5146 5163->5163 5165 403198 4 API calls 5164->5165 5166 404e56 5165->5166 5166->5146 5168 404e02 5167->5168 5174 404bfc 5168->5174 5170 404e30 5170->5161 5201 4039a4 5171->5201 5177 4059b0 5174->5177 5176 404c15 5176->5170 5178 4059be 5177->5178 5187 404cdc LoadStringA 5178->5187 5181 405194 33 API calls 5182 4059f6 5181->5182 5190 4031e8 5182->5190 5185 4031b8 4 API calls 5186 405a1b 5185->5186 5186->5176 5188 403278 18 API calls 5187->5188 5189 404d09 5188->5189 5189->5181 5191 4031ec 5190->5191 5192 4031fc 5190->5192 5191->5192 5196 403254 5191->5196 5193 403228 5192->5193 5195 4025ac 4 API calls 5192->5195 5193->5185 5195->5193 5197 403274 5196->5197 5198 403258 5196->5198 5197->5192 5199 402594 18 API calls 5198->5199 5200 403261 5199->5200 5200->5192 5202 4039ab 5201->5202 5207 4038b4 5202->5207 5204 4039cb 5205 403198 4 API calls 5204->5205 5206 4039d2 5205->5206 5206->5163 5208 4038d5 5207->5208 5209 4038c8 5207->5209 5210 403934 5208->5210 5211 4038db 5208->5211 5235 403780 5209->5235 5215 403993 5210->5215 5216 40393b 5210->5216 5213 4038e1 5211->5213 5214 4038ee 5211->5214 5242 403894 5213->5242 5219 403894 6 API calls 5214->5219 5220 4037f4 3 API calls 5215->5220 5221 403941 5216->5221 5222 40394b 5216->5222 5217 4038d0 5217->5204 5225 4038fc 5219->5225 5220->5217 5257 403864 5221->5257 5224 4037f4 3 API calls 5222->5224 5226 40395d 5224->5226 5247 4037f4 5225->5247 5228 403864 23 API calls 5226->5228 5230 403976 5228->5230 5229 403917 5253 40374c 5229->5253 5232 40374c VariantClear 5230->5232 5234 40398b 5232->5234 5233 40392c 5233->5204 5234->5204 5236 4037f0 5235->5236 5237 403744 5235->5237 5236->5217 5237->5235 5238 403793 VariantClear 5237->5238 5239 403198 4 API calls 5237->5239 5240 4037dc VariantCopyInd 5237->5240 5241 4037ab 5237->5241 5238->5237 5239->5237 5240->5236 5240->5237 5241->5217 5262 4036b8 5242->5262 5245 40374c VariantClear 5246 4038a9 5245->5246 5246->5217 5248 403845 VariantChangeTypeEx 5247->5248 5249 40380a VariantChangeTypeEx 5247->5249 5252 403832 5248->5252 5250 403826 5249->5250 5251 40374c VariantClear 5250->5251 5251->5252 5252->5229 5254 403759 5253->5254 5255 403766 5253->5255 5254->5255 5256 403779 VariantClear 5254->5256 5255->5233 5256->5233 5268 40369c SysStringLen 5257->5268 5260 40374c VariantClear 5261 403882 5260->5261 5261->5217 5263 4036cb 5262->5263 5264 403706 MultiByteToWideChar SysAllocStringLen MultiByteToWideChar 5263->5264 5265 4036db 5263->5265 5266 40372e 5264->5266 5267 4036ed MultiByteToWideChar SysAllocStringLen 5265->5267 5266->5245 5267->5266 5269 403610 21 API calls 5268->5269 5270 4036b3 5269->5270 5270->5260 5272 40594c 5271->5272 5273 404cdc 19 API calls 5272->5273 5274 405972 5273->5274 5275 4031e8 18 API calls 5274->5275 5276 40597d 5275->5276 5277 403198 4 API calls 5276->5277 5278 405992 5277->5278 5278->5156 5280 403198 4 API calls 5279->5280 5288 408cb1 5279->5288 5280->5288 5281 4031b8 4 API calls 5282 408d69 5281->5282 5282->5124 5283 403278 18 API calls 5283->5288 5284 408cc8 5285 4032fc 18 API calls 5284->5285 5287 408cdc 5285->5287 5286 4032fc 18 API calls 5286->5288 5287->5281 5288->5283 5288->5284 5288->5286 5288->5287 5290 4034fd 5289->5290 5297 40352d 5289->5297 5292 403526 5290->5292 5294 403509 5290->5294 5291 403198 4 API calls 5293 403517 5291->5293 5295 403254 18 API calls 5292->5295 5293->5055 5298 4025c4 5294->5298 5295->5297 5297->5291 5299 4025ca 5298->5299 5300 4025dc 5299->5300 5302 403154 5299->5302 5300->5293 5300->5300 5303 403164 5302->5303 5304 40318c TlsGetValue 5302->5304 5303->5300 5305 403196 5304->5305 5306 40316f 5304->5306 5305->5300 5310 40310c 5306->5310 5308 403174 TlsGetValue 5309 403184 5308->5309 5309->5300 5311 403120 LocalAlloc 5310->5311 5313 403116 5310->5313 5312 40313e TlsSetValue 5311->5312 5314 403132 5311->5314 5312->5314 5313->5311 5314->5308 5316 406b1c 5315->5316 5317 403278 18 API calls 5316->5317 5318 406b29 5317->5318 5325 403420 5318->5325 5320 406b31 5321 4031e8 18 API calls 5320->5321 5322 406b49 5321->5322 5323 403198 4 API calls 5322->5323 5324 406b6b 5323->5324 5324->5058 5326 403426 5325->5326 5328 403437 5325->5328 5327 403254 18 API calls 5326->5327 5326->5328 5327->5328 5328->5320 5330 4033bc 5329->5330 5331 403254 18 API calls 5330->5331 5332 4033cf 5331->5332 5333 4031e8 18 API calls 5332->5333 5334 4033f7 5333->5334 5336 402bd5 RaiseException 5335->5336 5337 402be6 5335->5337 5336->5337 5337->5081 5339 408e8e 5338->5339 5341 408ea6 5339->5341 5351 408e18 5339->5351 5342 408e18 18 API calls 5341->5342 5343 408eca 5341->5343 5342->5343 5354 407918 5343->5354 5345 408ee5 5346 408e18 18 API calls 5345->5346 5348 408ef8 5345->5348 5346->5348 5347 408e18 18 API calls 5347->5348 5348->5347 5349 403278 18 API calls 5348->5349 5350 408f27 5348->5350 5349->5348 5350->5083 5352 405890 18 API calls 5351->5352 5353 408e29 5352->5353 5353->5341 5357 4078c4 5354->5357 5358 4078d6 5357->5358 5359 4078e7 5357->5359 5360 4078db InterlockedExchange 5358->5360 5359->5345 5360->5359 5369 408f70 5361->5369 5363 408fd2 5364 408fd6 5363->5364 5365 408ff2 DeleteFileA GetLastError 5363->5365 5364->5093 5366 409010 5365->5366 5375 408fac 5366->5375 5370 408f7a 5369->5370 5371 408f7e 5369->5371 5370->5363 5372 408fa0 SetLastError 5371->5372 5373 408f87 Wow64DisableWow64FsRedirection 5371->5373 5374 408f9b 5372->5374 5373->5374 5374->5363 5376 408fb1 Wow64RevertWow64FsRedirection 5375->5376 5377 408fbb 5375->5377 5376->5377 5377->5093 5379 403566 5378->5379 5381 403578 5379->5381 5382 403604 5379->5382 5381->5105 5383 40357c 5382->5383 5384 4035a0 5383->5384 5387 4035d0 5383->5387 5388 40359b 5383->5388 5392 4035b6 5383->5392 5385 4035b1 5384->5385 5386 4035b8 5384->5386 5389 403198 4 API calls 5385->5389 5390 4031b8 4 API calls 5386->5390 5387->5392 5393 40357c 4 API calls 5387->5393 5388->5384 5391 4035ec 5388->5391 5389->5392 5390->5392 5391->5392 5394 403554 4 API calls 5391->5394 5392->5379 5393->5387 5394->5391 6685 401ab9 6686 401a96 6685->6686 6687 401aa9 RtlDeleteCriticalSection 6686->6687 6688 401a9f RtlLeaveCriticalSection 6686->6688 6688->6687

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 116 409b78-409b9c GetSystemInfo VirtualQuery 117 409ba2 116->117 118 409c2c-409c33 116->118 119 409c21-409c26 117->119 119->118 120 409ba4-409bab 119->120 121 409c0d-409c1f VirtualQuery 120->121 122 409bad-409bb1 120->122 121->118 121->119 122->121 123 409bb3-409bbb 122->123 124 409bcc-409bdd VirtualProtect 123->124 125 409bbd-409bc0 123->125 127 409be1-409be3 124->127 128 409bdf 124->128 125->124 126 409bc2-409bc5 125->126 126->124 129 409bc7-409bca 126->129 130 409bf2-409bf5 127->130 128->127 129->124 129->127 131 409be5-409bee call 409b70 130->131 132 409bf7-409bf9 130->132 131->130 132->121 134 409bfb-409c08 VirtualProtect 132->134 134->121
                                                                                    APIs
                                                                                    • GetSystemInfo.KERNEL32(?), ref: 00409B8A
                                                                                    • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409B95
                                                                                    • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409BD6
                                                                                    • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409C08
                                                                                    • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409C18
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$ProtectQuery$InfoSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2441996862-0
                                                                                    • Opcode ID: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                    • Instruction ID: 4a1d84bb43d4a47cf168f169447d483ed62c711ee8ccb48f5bfbfd053dbeaed9
                                                                                    • Opcode Fuzzy Hash: 69cc1b0b9b744b29044eea84e4744ba7a66f7205e02ae19cc0529fdcfa929845
                                                                                    • Instruction Fuzzy Hash: D421A1B16043006BDA309AA99C85E57B7E8AF45360F144C2BFA99E72C3D239FC40C669
                                                                                    APIs
                                                                                    • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 2299586839-0
                                                                                    • Opcode ID: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                    • Instruction ID: 1248db9972fbf410c55bf070b604c98f5d62b90992f8f49b6b6440a9954d2c50
                                                                                    • Opcode Fuzzy Hash: 08facca5f8c818d7ae0117448837c5e97f15c9e55cb3aedc2694e0bc5091a832
                                                                                    • Instruction Fuzzy Hash: E2E0927170021427D710A9A99C86AEB725CEB58310F0002BFB904E73C6EDB49E804AED

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040A618), ref: 00404582
                                                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040458F
                                                                                    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 004045A5
                                                                                    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 004045BB
                                                                                    • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,0040A618), ref: 004045C6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModulePolicyProcess
                                                                                    • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                    • API String ID: 3256987805-3653653586
                                                                                    • Opcode ID: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                    • Instruction ID: 1f393095ee8ecda9e1e01b6ca7d440447e938bbc9796bcd5dbe8d266940e5f64
                                                                                    • Opcode Fuzzy Hash: 5152b1c660b0fef0348360efae9d442e0d6811f491f57bfacbbc157bf84edc67
                                                                                    • Instruction Fuzzy Hash: 5FE02DD03813013AEA5032F20D83B2B20884AD0B49B2414377F25B61C3EDBDDA40587E

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • SetLastError.KERNEL32 ref: 0040AAC1
                                                                                      • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020924C0), ref: 0040966C
                                                                                    • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                    • SetWindowLongA.USER32(00020436,000000FC,00409960), ref: 0040AB15
                                                                                    • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                    • DestroyWindow.USER32(00020436,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ErrorLast$CreateDestroyDirectoryLongRemove
                                                                                    • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                    • API String ID: 3757039580-3001827809
                                                                                    • Opcode ID: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                                                                                    • Instruction ID: 81987b3bab642c92fe87a7372e0454594c4b8fe140ce311e0f93b1eeebf6ab37
                                                                                    • Opcode Fuzzy Hash: 7bc9c0c8e9dfd2478b94306391eafe1fb51b7566d8199cdbb2b2653dcbc3d95c
                                                                                    • Instruction Fuzzy Hash: 25412E70604204DBDB10EBA9EE89B9E37A5EB44304F10467FF510B72E2D7B89855CB9D

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090C4
                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090CA
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040913D,?,?,?,?,00000000,?,0040A62C), ref: 004090DE
                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 004090E4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                    • API String ID: 1646373207-2130885113
                                                                                    • Opcode ID: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                    • Instruction ID: 214dda5481ef482ebe311b1329301f35405b1013d97e3062c17ffb2c8286d57d
                                                                                    • Opcode Fuzzy Hash: 0414f1d66f28dc470df4633e5994336701384173b3f6f66b470f3ad827f759f7
                                                                                    • Instruction Fuzzy Hash: 21017C70748342AEFB00BB76DD4AB163A68E785704F60457BF640BA2D3DABD4C04D66E

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040AAFE
                                                                                    • SetWindowLongA.USER32(00020436,000000FC,00409960), ref: 0040AB15
                                                                                      • Part of subcall function 00406B7C: GetCommandLineA.KERNEL32(00000000,00406BC0,?,?,?,?,00000000,?,0040AB86,?), ref: 00406B94
                                                                                      • Part of subcall function 004099EC: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020924C0,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                      • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020924C0,00409AD8,00000000), ref: 00409A70
                                                                                      • Part of subcall function 004099EC: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                      • Part of subcall function 004099EC: GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                      • Part of subcall function 004099EC: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020924C0,00409AD8), ref: 00409AA4
                                                                                    • RemoveDirectoryA.KERNEL32(00000000,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC01
                                                                                    • DestroyWindow.USER32(00020436,0040AC54,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040AC15
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$CloseCreateHandleProcess$CodeCommandDestroyDirectoryExitLineLongMultipleObjectsRemoveWait
                                                                                    • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                                                                    • API String ID: 3586484885-3001827809
                                                                                    • Opcode ID: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                                                                                    • Instruction ID: d3376fcde1141b4290a3dca450fc2844fa47922897975e075ebf06e3b6db64eb
                                                                                    • Opcode Fuzzy Hash: c367800830601d7b7bb1e4b9cc729c69669d466ec6c890b8506752b9ad64910a
                                                                                    • Instruction Fuzzy Hash: 77411A71604204DFD714EBA9EE85B5A37B5EB48304F20427BF500BB2E1D7B8A855CB9D

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020924C0,00409AD8,00000000,00409ABF), ref: 00409A5C
                                                                                    • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020924C0,00409AD8,00000000), ref: 00409A70
                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409A89
                                                                                    • GetExitCodeProcess.KERNEL32(?,0040B244), ref: 00409A9B
                                                                                    • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,00409AE4,020924C0,00409AD8), ref: 00409AA4
                                                                                      • Part of subcall function 00409648: GetLastError.KERNEL32(00000000,004096EB,?,0040B244,?,020924C0), ref: 0040966C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                                                                    • String ID: D
                                                                                    • API String ID: 3356880605-2746444292
                                                                                    • Opcode ID: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                    • Instruction ID: b58d0f6e2b8975977e6c7b71aada5392bea55c03070ce9fad3dcef5aa6d4018a
                                                                                    • Opcode Fuzzy Hash: aadf6f075de5bdb3c28d757ddccd10dd30f6bbfdbbad62eb54c24073370c977f
                                                                                    • Instruction Fuzzy Hash: EE1142B16402486EDB00EBE6CC42F9EB7ACEF49714F50013BB604F72C6DA785D048A69

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 136 401918-40193a RtlInitializeCriticalSection 137 401946-40197c call 4012dc * 3 LocalAlloc 136->137 138 40193c-401941 RtlEnterCriticalSection 136->138 145 4019ad-4019c1 137->145 146 40197e 137->146 138->137 150 4019c3-4019c8 RtlLeaveCriticalSection 145->150 151 4019cd 145->151 147 401983-401995 146->147 147->147 149 401997-4019a6 147->149 149->145 150->151
                                                                                    APIs
                                                                                    • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                    • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                    • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                    • String ID:
                                                                                    • API String ID: 730355536-0
                                                                                    • Opcode ID: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                    • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                                                                    • Opcode Fuzzy Hash: 38709c719971e1168baf9cdc3c67f999ad3db3ab521e9349fb3b390a12b3c6f3
                                                                                    • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message
                                                                                    • String ID: .tmp$y@
                                                                                    • API String ID: 2030045667-2396523267
                                                                                    • Opcode ID: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                                                                                    • Instruction ID: 5e9257013af3d55ef2b6e359c41f87f67318ae2a4e6dbf07461b5d8c6de74657
                                                                                    • Opcode Fuzzy Hash: 55a53fbd7ad7285035f8ab2cde1915fb146aa3dc543cd9b52406218d685c1c98
                                                                                    • Instruction Fuzzy Hash: 3B41C030704200CFD311EF25DED1A1A77A5EB49304B214A3AF804B73E1CAB9AC11CBAD

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 0040A878
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message
                                                                                    • String ID: .tmp$y@
                                                                                    • API String ID: 2030045667-2396523267
                                                                                    • Opcode ID: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                                                                                    • Instruction ID: 95bba075cf9db07042691c1556ef0613dbe482a65a3614fff4d0ead14828e6f7
                                                                                    • Opcode Fuzzy Hash: 4e131503fe38447772e4e2294cf5373b7e2007f9fac8d76d0a71823c743fc64d
                                                                                    • Instruction Fuzzy Hash: E341BE30700200DFC711EF65DED2A1A77A5EB49304B104A3AF804B73E2CAB9AC01CBAD

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00409376
                                                                                    • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040941F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0040937F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                    • String ID: .tmp
                                                                                    • API String ID: 1375471231-2986845003
                                                                                    • Opcode ID: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                    • Instruction ID: b240cf9bc22f775501a2d99da134be40bb2f76fb21a7d6e050461713caae6e8b
                                                                                    • Opcode Fuzzy Hash: 1c7982c9535877cc809d76a2290e1ec991a7408e90ad789d49a53b04ffd62ed2
                                                                                    • Instruction Fuzzy Hash: 9E216774A00208ABDB05EFA1C8429DFB7B8EF88304F50457BE901B73C2DA3C9E058A65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 342 407749-40774a 343 4076dc-4076e6 WriteFile 342->343 344 40774c-40776f 342->344 345 4076e8-4076ea call 40748c 343->345 346 4076ef-4076f2 343->346 347 407770-407785 344->347 345->346 349 407700-407704 346->349 350 4076f4-4076fb call 4073ec 346->350 351 407787 347->351 352 4077f9 347->352 350->349 354 40778a-40778f 351->354 355 4077fd-407802 351->355 356 40783b-40783d 352->356 357 4077fb 352->357 359 407803-407819 354->359 361 407791-407792 354->361 355->359 360 407841-407843 356->360 357->355 362 40785b-40785c 359->362 370 40781b 359->370 360->362 363 407724-407741 361->363 364 407794-4077b4 361->364 366 4078d6-4078eb call 407890 InterlockedExchange 362->366 367 40785e-40788c 362->367 369 4077b5 363->369 372 407743 363->372 364->369 387 407912-407917 366->387 388 4078ed-407910 366->388 380 407820-407823 367->380 381 407890-407893 367->381 374 4077b6-4077b7 369->374 375 4077f7-4077f8 369->375 376 40781e-40781f 370->376 378 407746-407747 372->378 379 4077b9 372->379 374->379 375->352 376->380 378->342 382 4077bb-4077cd 378->382 379->382 384 407898 380->384 385 407824 380->385 381->384 382->360 386 4077cf-4077d4 382->386 389 40789a 384->389 385->389 390 407825 385->390 386->356 395 4077d6-4077de 386->395 388->387 388->388 392 40789f 389->392 393 407896-407897 390->393 394 407826-40782d 390->394 396 4078a1 392->396 393->384 394->396 397 40782f 394->397 395->347 405 4077e0 395->405 399 4078a3 396->399 400 4078ac 396->400 401 407832-407833 397->401 402 4078a5-4078aa 397->402 399->402 404 4078ae-4078af 400->404 401->356 401->376 402->404 404->392 406 4078b1-4078bd 404->406 405->375 406->384 407 4078bf-4078c0 406->407
                                                                                    APIs
                                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3934441357-0
                                                                                    • Opcode ID: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                    • Instruction ID: 20d0a63744b7af467993d3e8aec565234b7be2d060ba20bf9fd199bb98bd5a4e
                                                                                    • Opcode Fuzzy Hash: 43d3196ec1ce5242573e8f450cfa6a0a1bc6604aabb0088ea34051851cbbaa4a
                                                                                    • Instruction Fuzzy Hash: 8251D12294D2910FC7126B7849685A53FE0FE5331132E92FBC5C1AB1A3D27CA847D35B

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 408 401fd4-401fe6 409 401fe8 call 401918 408->409 410 401ffb-402010 408->410 414 401fed-401fef 409->414 412 402012-402017 RtlEnterCriticalSection 410->412 413 40201c-402025 410->413 412->413 415 402027 413->415 416 40202c-402032 413->416 414->410 417 401ff1-401ff6 414->417 415->416 418 402038-40203c 416->418 419 4020cb-4020d1 416->419 420 40214f-402158 417->420 423 402041-402050 418->423 424 40203e 418->424 421 4020d3-4020e0 419->421 422 40211d-40211f call 401ee0 419->422 425 4020e2-4020ea 421->425 426 4020ef-40211b call 402f54 421->426 432 402124-40213b 422->432 423->419 427 402052-402060 423->427 424->423 425->426 426->420 430 402062-402066 427->430 431 40207c-402080 427->431 436 402068 430->436 437 40206b-40207a 430->437 433 402082 431->433 434 402085-4020a0 431->434 440 402147 432->440 441 40213d-402142 RtlLeaveCriticalSection 432->441 433->434 439 4020a2-4020c6 call 402f54 434->439 436->437 437->439 439->420 441->440
                                                                                    APIs
                                                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00402148), ref: 00402017
                                                                                      • Part of subcall function 00401918: RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                                                                      • Part of subcall function 00401918: RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                                                                      • Part of subcall function 00401918: LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                                                                      • Part of subcall function 00401918: RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                    • String ID:
                                                                                    • API String ID: 296031713-0
                                                                                    • Opcode ID: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                    • Instruction ID: b272be6629c35a549fc4f1c5a19e6e0df2414f51bb24a7fd7fb800939d1160d0
                                                                                    • Opcode Fuzzy Hash: e41243de7c80276a36dcdd2c2c0e451bb1a6f3055e5ddec7aea90b49354f7273
                                                                                    • Instruction Fuzzy Hash: D4419CB2A40711DFDB108F69DEC562A77A0FB58314B25837AD984B73E1D378A842CB48

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 444 406fa0-406ff3 SetErrorMode call 403414 LoadLibraryA
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00008000), ref: 00406FAA
                                                                                    • LoadLibraryA.KERNEL32(00000000,00000000,00406FF4,?,00000000,00407012,?,00008000), ref: 00406FD9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLibraryLoadMode
                                                                                    • String ID:
                                                                                    • API String ID: 2987862817-0
                                                                                    • Opcode ID: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                    • Instruction ID: 292e1fc4e19851716b0ab93d2d43454b233f1d25ff8a05a0d03104374ea2dcbc
                                                                                    • Opcode Fuzzy Hash: 9b48b29771c4fc6652b627c4d055133170331230f079557c80f3f4e2880abe46
                                                                                    • Instruction Fuzzy Hash: D6F08270A14704BEDB129FB68C5282ABBECEB4DB0475349BAF914A26D2E53C5C209568
                                                                                    APIs
                                                                                    • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040768B
                                                                                    • GetLastError.KERNEL32(?,?,?,00000000), ref: 00407693
                                                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020903AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$FilePointer
                                                                                    • String ID:
                                                                                    • API String ID: 1156039329-0
                                                                                    • Opcode ID: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                    • Instruction ID: 64daf3b7b2b4cd691f255a674f922558070816022eb0a012369b73df1192a31e
                                                                                    • Opcode Fuzzy Hash: cf8b3d77442686d6cce32677ffa2556d95a4d660bd32a6059a32509021572d83
                                                                                    • Instruction Fuzzy Hash: B2E092766081016FD600D55EC881B9B37DCDFC5364F104536B654EB2D1D679EC108776

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 448 40762c-40764a ReadFile 449 407663-40766a 448->449 450 40764c-407650 448->450 451 407652-40765a GetLastError 450->451 452 40765c-40765e call 40748c 450->452 451->449 451->452 452->449
                                                                                    APIs
                                                                                    • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 00407643
                                                                                    • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 00407652
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLastRead
                                                                                    • String ID:
                                                                                    • API String ID: 1948546556-0
                                                                                    • Opcode ID: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                    • Instruction ID: e2f452503b48da12a69c10a9d1416f2aa512a4714c212e67fea7d8588799396e
                                                                                    • Opcode Fuzzy Hash: 1b4aea639ae4b78e93b9ef79541d7064bf1f98a27d237b51b731e51654b8bdcb
                                                                                    • Instruction Fuzzy Hash: 69E012A1A081106ADB24A66E9CC5F6B6BDCCBC5724F14457BF504DB382D678DC0487BB
                                                                                    APIs
                                                                                    • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 004075DB
                                                                                    • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 004075E7
                                                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020903AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$FilePointer
                                                                                    • String ID:
                                                                                    • API String ID: 1156039329-0
                                                                                    • Opcode ID: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                    • Instruction ID: 74cf86129294d2faf5969c20f66175129728110ffa3c668ef2bae8a95e28f18b
                                                                                    • Opcode Fuzzy Hash: 7730a1f6a5d1c383143cef2e1ec1cb69b5af0836910a757b2920ce96cbe13b7f
                                                                                    • Instruction Fuzzy Hash: C4E04FB1600210AFDB10EEB98D81B9676D89F48364F0485B6EA14DF2C6D274DC00C766
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$AllocFree
                                                                                    • String ID:
                                                                                    • API String ID: 2087232378-0
                                                                                    • Opcode ID: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                    • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                                                                    • Opcode Fuzzy Hash: 2e9c029c9a25ba07e21da294550151284eb3fb058128c9ffe8d20eb9f4f906d3
                                                                                    • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                                                                    APIs
                                                                                    • GetSystemDefaultLCID.KERNEL32(00000000,004053B6), ref: 0040529F
                                                                                      • Part of subcall function 00404CDC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404CF9
                                                                                      • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                    • String ID:
                                                                                    • API String ID: 1658689577-0
                                                                                    • Opcode ID: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                    • Instruction ID: b95c725f163960c8622ba1b0af82130980b93a97e76f79286a035b518bc8de08
                                                                                    • Opcode Fuzzy Hash: ef449c44a2a61a26d18614e24c7ade2666283ce56a0d8fcdc2eeed56ad2c4646
                                                                                    • Instruction Fuzzy Hash: 90314F75E01509ABCB00DF95C8C19EEB379FF84304F158577E815BB286E739AE068B98
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                    • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                                                                    • Opcode Fuzzy Hash: c8aa5b1e1f382d9b7ab40d46c96f796d669d4b8c7333918930cf1677525ebce7
                                                                                    • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 004075B8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                    • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                                                                    • Opcode Fuzzy Hash: 3bd7282c13d8f152a8301508d2aa72b6e2817799d08f3caede8a9fdcd0036c45
                                                                                    • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                                                                    APIs
                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,00406A24,?,?,?,?,00000000,?,00406A39,00406D67,00000000,00406DAC,?,?,?), ref: 00406A07
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                    • Instruction ID: ccd219c895c276d3a4f2ed408fb3af00451e62210c6f1137e8185e88dac79a2a
                                                                                    • Opcode Fuzzy Hash: 2f6b808c0a98facf9b4219f47e50352985dbcf5de86cc118cb6830f30f21a29b
                                                                                    • Instruction Fuzzy Hash: A0E0ED30300304BBD301FBA6CC42E4ABBECDB8A708BA28476B400B2682D6786E108428
                                                                                    APIs
                                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 004076DF
                                                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020903AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLastWrite
                                                                                    • String ID:
                                                                                    • API String ID: 442123175-0
                                                                                    • Opcode ID: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                    • Instruction ID: d11fc940c1eb4d9ab9bd5ee1403c634941755763b259216c6d34bff68e3e8731
                                                                                    • Opcode Fuzzy Hash: 8d2af3ab7a63a8387ab01b8eb17bee2761ee08039256abb6018552f25082062b
                                                                                    • Instruction Fuzzy Hash: 6DE0ED766081106BD710A65AD880EAB67DCDFC5764F00407BF904DB291D574AC049676
                                                                                    APIs
                                                                                    • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409127,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 004072A3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FormatMessage
                                                                                    • String ID:
                                                                                    • API String ID: 1306739567-0
                                                                                    • Opcode ID: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                    • Instruction ID: 7b38442d06f496379890204edef453c821f476d6c52b93f329ea0e63e965d40b
                                                                                    • Opcode Fuzzy Hash: 7ef42d69529baecca532a801bf1eab389dc79dba057db81877db687b261eaad4
                                                                                    • Instruction Fuzzy Hash: 17E0D8A0B8830136F22414544C87B77220E47C0700F10807E7700ED3C6D6BEA906815F
                                                                                    APIs
                                                                                    • SetEndOfFile.KERNEL32(?,020A8000,0040AA59,00000000), ref: 004076B3
                                                                                      • Part of subcall function 0040748C: GetLastError.KERNEL32(0040738C,0040752A,?,?,020903AC,?,0040A69B,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 0040748F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLast
                                                                                    • String ID:
                                                                                    • API String ID: 734332943-0
                                                                                    • Opcode ID: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                    • Instruction ID: f788b2e916ece263959a2b362e6cc5638f15ca068e5e6b6e193a7bb405067b9b
                                                                                    • Opcode Fuzzy Hash: 3c9e02bda174eefd6a6752df40b73b0cbe28e66d981a9881f8e50d89b6fd2d40
                                                                                    • Instruction Fuzzy Hash: BEC04CA1A1410047CB40A6BE89C1A1666D85A4821530485B6B908DB297D679E8004666
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode
                                                                                    • String ID:
                                                                                    • API String ID: 2340568224-0
                                                                                    • Opcode ID: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                    • Instruction ID: c47f2f618e2971e07f5b1abb1c43dc6c143ad8b034d1ddbdae76011a93498253
                                                                                    • Opcode Fuzzy Hash: 070e151ae7371931e812c23e1680e2574253ea8634671ff6451d3f815f7c1847
                                                                                    • Instruction Fuzzy Hash: 54B09B76A1C2415DE705DAD5745153863D4D7C47143A14977F104D35C0D53DA4144519
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(?,00407019), ref: 0040700C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode
                                                                                    • String ID:
                                                                                    • API String ID: 2340568224-0
                                                                                    • Opcode ID: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                    • Instruction ID: a55afa0689d716a84ca499c05243e055e04a08b2ab071a0afeb25d409e08decd
                                                                                    • Opcode Fuzzy Hash: 258b7047379ce46b8540a294da6ad57472ce1849ceeb23a1b4b516eeda09cad2
                                                                                    • Instruction Fuzzy Hash: FFA022A8C08000B2CE00E2E08080A3C23283A88308BC08BA2320CB20C0C03CE008020B
                                                                                    APIs
                                                                                    • CharPrevA.USER32(?,?,0040696C,?,00406649,?,?,00406D87,00000000,00406DAC,?,?,?,?,00000000,00000000), ref: 00406972
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CharPrev
                                                                                    • String ID:
                                                                                    • API String ID: 122130370-0
                                                                                    • Opcode ID: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                    • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                                                                    • Opcode Fuzzy Hash: 4f55c7aa95ee0cc6def6f8b84b07f7a00b4eea213dcaa2411b48aa5a82a0c27b
                                                                                    • Instruction Fuzzy Hash:
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407FA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                    • Instruction ID: 1e7236936b067224bcb0a7c190bcfb18a105a15b1652d3161176e1d0ad605fa4
                                                                                    • Opcode Fuzzy Hash: 636722d4ca057b68616df378e1b8a5bd7f337355b9f7c137ab23b8dc1cafdb71
                                                                                    • Instruction Fuzzy Hash: 43116371A042059BDB00EF19C881B5B7794AF44359F05807AF958AB2C6DB38E800CBAA
                                                                                    APIs
                                                                                    • VirtualFree.KERNEL32(?,?,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 1263568516-0
                                                                                    • Opcode ID: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                    • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                                                                    • Opcode Fuzzy Hash: b4adf7af80dac51c1d798f2a6c61165d01e4b71ea77261fd7569ef2c91f553a4
                                                                                    • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                    • Instruction ID: e7ddd8f09f86228f97b62737e097d00c20d119481f2284b048c56b7aa048eabb
                                                                                    • Opcode Fuzzy Hash: fc6098dcd6b1504a072b68d3feaaa537492281b052079d944a979dec092e75e7
                                                                                    • Instruction Fuzzy Hash: 41D05E82B00A6017D615F2BE4D8869692D85F89685B08843AF654E77D1D67CEC00838D
                                                                                    APIs
                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,00407E9D), ref: 00407ECF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 1263568516-0
                                                                                    • Opcode ID: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                    • Instruction ID: 622015b425f940adf6dc1d0f89e873b9c6d17cfe6f0c2733970da1323f12c917
                                                                                    • Opcode Fuzzy Hash: c7bedad96efb848ea9f674ed311898bb29a23f2a16fc3a9de009753beeeb9dd9
                                                                                    • Instruction Fuzzy Hash: 3ED0E9B17553055BDB90EEB98CC1B0237D8BB48610F5044B66904EB296E674E8009654
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000028), ref: 00409457
                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 0040945D
                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00409476
                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 0040949D
                                                                                    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000,00000000,SeShutdownPrivilege), ref: 004094A2
                                                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 004094B3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                    • String ID: SeShutdownPrivilege
                                                                                    • API String ID: 107509674-3733053543
                                                                                    • Opcode ID: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                    • Instruction ID: 55e16e97e4c30333ef6e9d7cb44a764448f3c494fd9ead6bbbdf5d5bb2f9c1eb
                                                                                    • Opcode Fuzzy Hash: 5d5c4cc2167cea31fe6e778ad900630fb502c4628614430f67a63468396a48bc
                                                                                    • Instruction Fuzzy Hash: 61F012B069830179E610AAB18D07F6762885BC4B18F50493ABB15FA1C3D7BDD809466F
                                                                                    APIs
                                                                                    • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409C3E
                                                                                    • SizeofResource.KERNEL32(00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000,0040ACC9), ref: 00409C51
                                                                                    • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92,?,00000000), ref: 00409C63
                                                                                    • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,0040A6B3,00000000,0040AC4A,?,00000001,00000000,00000002,00000000,0040AC92), ref: 00409C74
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                    • String ID:
                                                                                    • API String ID: 3473537107-0
                                                                                    • Opcode ID: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                    • Instruction ID: 5c2a5118689e511edc0a9dde7e1b9e77d0383d271af581b44440e1e73e890ea9
                                                                                    • Opcode Fuzzy Hash: 66472a43d98f2116202d14454299061058d21427157a3f4f4112e001326967e1
                                                                                    • Instruction Fuzzy Hash: B0E07E80B8874726FA6576FB08C7B6B008C4BA570EF00003BB700792C3DDBC8C04462E
                                                                                    APIs
                                                                                    • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 2299586839-0
                                                                                    • Opcode ID: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                    • Instruction ID: 1db3d1c1bb6fab5f91442dea8a08a829cd161d84d3a7e1f0c2fe21aaaafd944f
                                                                                    • Opcode Fuzzy Hash: b79b605a6dbd2dbd76dc5df923bc970e8acc9169766131cf64cabc826e101d13
                                                                                    • Instruction Fuzzy Hash: 9ED02EA230E2006AE210808B2C84EBB4A9CCEC53A0F00007FF648C3242D2208C029B76
                                                                                    APIs
                                                                                    • GetSystemTime.KERNEL32(?), ref: 004026CE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: SystemTime
                                                                                    • String ID:
                                                                                    • API String ID: 2656138-0
                                                                                    • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                    • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                                                                    • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                                                                    • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                                                                    APIs
                                                                                    • GetVersionExA.KERNEL32(?,004065F0,00000000,004065FE,?,?,?,?,?,0040A622), ref: 00405D02
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Version
                                                                                    • String ID:
                                                                                    • API String ID: 1889659487-0
                                                                                    • Opcode ID: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                    • Instruction ID: 4c33b40dd65743d8d98a5ffd827b1eb297e5dd4f71424004bfe2d5ab9b26ea54
                                                                                    • Opcode Fuzzy Hash: 804cda8d473c4c61bcc63f12479ba9190822d5c554409fc9a119c77cb0a2aa37
                                                                                    • Instruction Fuzzy Hash: 00C0126040070186D7109B31DC02B1672D4AB44310F4405396DA4963C2E73C80018A6E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                    • Instruction ID: 7dc6dc86846b3232beed044054ddb30c9891ac2fec336679fba6e94018ae2b4c
                                                                                    • Opcode Fuzzy Hash: 4d767100099eb102bdc21c19fdb755dbde7929e86d9821f584b3da527505dd0e
                                                                                    • Instruction Fuzzy Hash: C032D775E00219DFCB14CF99CA80AADB7B2BF88314F24816AD855B7385DB34AE42CF55
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 0040704D
                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00407053
                                                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407129,?,00000000,00409918), ref: 004070A1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressCloseHandleModuleProc
                                                                                    • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                                                                    • API String ID: 4190037839-2401316094
                                                                                    • Opcode ID: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                    • Instruction ID: c068e7fb85b52830e378cef5638f1cf195f9e270113e5aa630163df598a56aa7
                                                                                    • Opcode Fuzzy Hash: 84283e8ecd5f01446eeee6c4ca3ac4597d6d061694d9d4138b3ca6e7d0b19e25
                                                                                    • Instruction Fuzzy Hash: 72214170E04209ABDB10EAB5CC55A9E77A9EB48304F60847BA510FB3C1D7BCAE01875E
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                                                                    • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                                                                    • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                    • String ID:
                                                                                    • API String ID: 1694776339-0
                                                                                    • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                    • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                                                                    • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                                                                    • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                                                                    APIs
                                                                                    • GetSystemDefaultLCID.KERNEL32(00000000,0040560C,?,?,?,?,00000000,00000000,00000000,?,004065EB,00000000,004065FE), ref: 004053DE
                                                                                      • Part of subcall function 0040520C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,004052D7,?,00000000,004053B6), ref: 0040522A
                                                                                      • Part of subcall function 00405258: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040545A,?,?,?,00000000,0040560C), ref: 0040526B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale$DefaultSystem
                                                                                    • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                    • API String ID: 1044490935-665933166
                                                                                    • Opcode ID: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                    • Instruction ID: cc137df54ae1fcbb63b87987e69a719e9c27c4b31815d0debc5c9b1d2781c89a
                                                                                    • Opcode Fuzzy Hash: 2becd82198b95216644133442ecc563e5ef80f5327bc31795fb041598c227e39
                                                                                    • Instruction Fuzzy Hash: F8515374B00548ABDB00EBA59891A5F7769DB88304F50D5BBB515BB3C6CA3DCA058F1C
                                                                                    APIs
                                                                                    • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                                                                    • LocalFree.KERNEL32(0070A378,00000000,00401AB4), ref: 00401A1B
                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000,0070A378,00000000,00401AB4), ref: 00401A3A
                                                                                    • LocalFree.KERNEL32(0070B378,?,00000000,00008000,0070A378,00000000,00401AB4), ref: 00401A79
                                                                                    • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                                                                    • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 3782394904-0
                                                                                    • Opcode ID: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                    • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                                                                    • Opcode Fuzzy Hash: 57d208b384dc2f586c03b96f4df297de7af50f17441c1957de60d2bf1c39d9ad
                                                                                    • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D
                                                                                    APIs
                                                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                                                                    • ExitProcess.KERNEL32 ref: 00403DE5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExitMessageProcess
                                                                                    • String ID: Error$Runtime error at 00000000$9@
                                                                                    • API String ID: 1220098344-1503883590
                                                                                    • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                    • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                                                                    • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                                                                    • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                                                                    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                                                                    • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$AllocString
                                                                                    • String ID:
                                                                                    • API String ID: 262959230-0
                                                                                    • Opcode ID: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                    • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                                                                    • Opcode Fuzzy Hash: 759139aa8138bb4f1b890a81a570935fc2f09484a8ccbcda4eb7e9d11bc9ffe5
                                                                                    • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(00000000,0040A60E), ref: 004030E3
                                                                                    • GetCommandLineA.KERNEL32(00000000,0040A60E), ref: 004030EE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CommandHandleLineModule
                                                                                    • String ID: U1hd.@$`&o
                                                                                    • API String ID: 2123368496-2259745735
                                                                                    • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                    • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                                                                    • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                                                                    • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD
                                                                                    APIs
                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000,00409918,00000000), ref: 00406E4C
                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,70000000,?,?,00000000,00000000,00000000,?,00000000,00406F48,?,00000000), ref: 00406EBC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: QueryValue
                                                                                    • String ID: )q@
                                                                                    • API String ID: 3660427363-2284170586
                                                                                    • Opcode ID: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                    • Instruction ID: 22a93fbabe645b78fd14ced98f65bd4bcb22fe3fd6f8222f7fa8e6a3c98f8dfc
                                                                                    • Opcode Fuzzy Hash: 32d2d681139902fa63b50b1e86c1c6042aee641263ad409bd5d16b68eaa8278f
                                                                                    • Instruction Fuzzy Hash: E6415E31D0021AAFDB21DF95C881BAFB7B8EB04704F56447AE901F7280D738AF108B99
                                                                                    APIs
                                                                                    • MessageBoxA.USER32(00000000,00000000,Setup,00000010), ref: 00409CBD
                                                                                    Strings
                                                                                    • The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si, xrefs: 00409CA1
                                                                                    • Setup, xrefs: 00409CAD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message
                                                                                    • String ID: Setup$The Setup program accepts optional command line parameters./HELP, /?Shows this information./SP-Disables the This will install... Do you wish to continue? prompt at the beginning of Setup./SILENT, /VERYSILENTInstructs Setup to be silent or very si
                                                                                    • API String ID: 2030045667-3271211647
                                                                                    • Opcode ID: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                    • Instruction ID: b8b600ed6bdfe48e96a015bdf4867c85bc36f5512d0f27a60c0f94c744360238
                                                                                    • Opcode Fuzzy Hash: bc66b1cf8cea732a030952d466b76090b354ad7a58696f118c0a4b0261ee3717
                                                                                    • Instruction Fuzzy Hash: 8EE0E5302482087EE311EA528C13F6A7BACE789B04F600477F900B15C3D6786E00A068
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 004094F7
                                                                                    • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409507
                                                                                    • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 0040951A
                                                                                    • GetLastError.KERNEL32(?,?,?,0000000D,?,0040ABED,000000FA,00000032,0040AC54), ref: 00409524
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.3930520390.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.3930500937.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930546010.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.3930566751.0000000000411000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastSleep
                                                                                    • String ID:
                                                                                    • API String ID: 1458359878-0
                                                                                    • Opcode ID: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                    • Instruction ID: cd4a420f7ace5638a97e0bdb8a1e9fccbb234b9240edd4770f97938e6011a3cc
                                                                                    • Opcode Fuzzy Hash: 97bb3b87fdda019371420e794be163fcf62410a15a23215566f33b90e6dc6563
                                                                                    • Instruction Fuzzy Hash: 16F0967360451477CA35A5AF9D81A5F634DDAD1354B10813BE945F3283C538DD0142A9

                                                                                    Execution Graph

                                                                                    Execution Coverage:16%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:4.7%
                                                                                    Total number of Nodes:2000
                                                                                    Total number of Limit Nodes:86
                                                                                    execution_graph 49970 40cd00 49971 40cd12 49970->49971 49972 40cd0d 49970->49972 49974 406f48 CloseHandle 49972->49974 49974->49971 49975 492848 49976 49287c 49975->49976 49977 49287e 49976->49977 49978 492892 49976->49978 50121 446f9c 18 API calls 49977->50121 49981 4928ce 49978->49981 49982 4928a1 49978->49982 49980 492887 Sleep 50041 4928c9 49980->50041 49987 49290a 49981->49987 49988 4928dd 49981->49988 50111 446ff8 49982->50111 49986 4928b0 49989 4928b8 FindWindowA 49986->49989 49993 492919 49987->49993 49994 492960 49987->49994 49990 446ff8 18 API calls 49988->49990 50115 447278 49989->50115 49992 4928ea 49990->49992 49996 4928f2 FindWindowA 49992->49996 50122 446f9c 18 API calls 49993->50122 50000 4929bc 49994->50000 50001 49296f 49994->50001 49998 447278 5 API calls 49996->49998 49997 492925 50123 446f9c 18 API calls 49997->50123 50054 492905 49998->50054 50008 492a18 50000->50008 50009 4929cb 50000->50009 50126 446f9c 18 API calls 50001->50126 50003 492932 50124 446f9c 18 API calls 50003->50124 50004 49297b 50127 446f9c 18 API calls 50004->50127 50007 49293f 50125 446f9c 18 API calls 50007->50125 50019 492a52 50008->50019 50020 492a27 50008->50020 50131 446f9c 18 API calls 50009->50131 50010 492988 50128 446f9c 18 API calls 50010->50128 50014 49294a SendMessageA 50018 447278 5 API calls 50014->50018 50015 4929d7 50132 446f9c 18 API calls 50015->50132 50017 492995 50129 446f9c 18 API calls 50017->50129 50018->50054 50028 492a61 50019->50028 50029 492aa0 50019->50029 50023 446ff8 18 API calls 50020->50023 50021 4929e4 50133 446f9c 18 API calls 50021->50133 50026 492a34 50023->50026 50025 4929a0 PostMessageA 50130 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50025->50130 50033 492a3c RegisterClipboardFormatA 50026->50033 50027 4929f1 50134 446f9c 18 API calls 50027->50134 50136 446f9c 18 API calls 50028->50136 50037 492aaf 50029->50037 50043 492af4 50029->50043 50034 447278 5 API calls 50033->50034 50034->50041 50035 4929fc SendNotifyMessageA 50135 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50035->50135 50036 492a6d 50137 446f9c 18 API calls 50036->50137 50139 446f9c 18 API calls 50037->50139 50161 403420 50041->50161 50042 492a7a 50138 446f9c 18 API calls 50042->50138 50048 492b48 50043->50048 50049 492b03 50043->50049 50044 492abb 50140 446f9c 18 API calls 50044->50140 50047 492a85 SendMessageA 50051 447278 5 API calls 50047->50051 50058 492baa 50048->50058 50059 492b57 50048->50059 50143 446f9c 18 API calls 50049->50143 50050 492ac8 50141 446f9c 18 API calls 50050->50141 50051->50054 50054->50041 50055 492b0f 50144 446f9c 18 API calls 50055->50144 50057 492ad3 PostMessageA 50142 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50057->50142 50066 492bb9 50058->50066 50067 492c31 50058->50067 50062 446ff8 18 API calls 50059->50062 50060 492b1c 50145 446f9c 18 API calls 50060->50145 50064 492b64 50062->50064 50147 42e394 SetErrorMode 50064->50147 50065 492b27 SendNotifyMessageA 50146 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50065->50146 50070 446ff8 18 API calls 50066->50070 50075 492c40 50067->50075 50076 492c66 50067->50076 50072 492bc8 50070->50072 50071 492b71 50073 492b87 GetLastError 50071->50073 50074 492b77 50071->50074 50150 446f9c 18 API calls 50072->50150 50077 447278 5 API calls 50073->50077 50078 447278 5 API calls 50074->50078 50155 446f9c 18 API calls 50075->50155 50085 492c98 50076->50085 50086 492c75 50076->50086 50079 492b85 50077->50079 50078->50079 50082 447278 5 API calls 50079->50082 50081 492c4a FreeLibrary 50156 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50081->50156 50082->50041 50094 492ca7 50085->50094 50100 492cdb 50085->50100 50090 446ff8 18 API calls 50086->50090 50087 492bdb GetProcAddress 50088 492c21 50087->50088 50089 492be7 50087->50089 50154 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50088->50154 50151 446f9c 18 API calls 50089->50151 50092 492c81 50090->50092 50098 492c89 CreateMutexA 50092->50098 50157 48ccc8 18 API calls 50094->50157 50095 492bf3 50152 446f9c 18 API calls 50095->50152 50098->50041 50099 492c00 50103 447278 5 API calls 50099->50103 50100->50041 50159 48ccc8 18 API calls 50100->50159 50102 492cb3 50104 492cc4 OemToCharBuffA 50102->50104 50105 492c11 50103->50105 50158 48cce0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50104->50158 50153 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50105->50153 50108 492cf6 50109 492d07 CharToOemBuffA 50108->50109 50160 48cce0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 50109->50160 50112 447000 50111->50112 50165 436078 50112->50165 50114 44701f 50114->49986 50116 447280 50115->50116 50219 4363e0 VariantClear 50116->50219 50118 4472a3 50119 4472ba 50118->50119 50220 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50118->50220 50119->50041 50121->49980 50122->49997 50123->50003 50124->50007 50125->50014 50126->50004 50127->50010 50128->50017 50129->50025 50130->50054 50131->50015 50132->50021 50133->50027 50134->50035 50135->50041 50136->50036 50137->50042 50138->50047 50139->50044 50140->50050 50141->50057 50142->50054 50143->50055 50144->50060 50145->50065 50146->50041 50221 403738 50147->50221 50150->50087 50151->50095 50152->50099 50153->50054 50154->50054 50155->50081 50156->50041 50157->50102 50158->50041 50159->50108 50160->50041 50163 403426 50161->50163 50162 40344b 50163->50162 50164 402660 4 API calls 50163->50164 50164->50163 50166 436084 50165->50166 50176 4360a6 50165->50176 50166->50176 50185 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50166->50185 50167 436129 50194 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50167->50194 50169 436111 50189 403494 50169->50189 50170 436105 50170->50114 50171 4360f9 50180 403510 4 API calls 50171->50180 50172 4360ed 50186 403510 50172->50186 50173 43611d 50193 4040e8 18 API calls 50173->50193 50176->50167 50176->50169 50176->50170 50176->50171 50176->50172 50176->50173 50179 43613a 50179->50114 50184 436102 50180->50184 50182 436126 50182->50114 50184->50114 50185->50176 50195 4034e0 50186->50195 50190 403498 50189->50190 50191 4034ba 50190->50191 50192 402660 4 API calls 50190->50192 50191->50114 50192->50191 50193->50182 50194->50179 50200 4034bc 50195->50200 50197 4034f0 50205 403400 50197->50205 50201 4034c0 50200->50201 50202 4034dc 50200->50202 50209 402648 50201->50209 50202->50197 50204 4034c9 50204->50197 50206 403406 50205->50206 50207 40341f 50205->50207 50206->50207 50214 402660 50206->50214 50207->50114 50210 40264c 50209->50210 50211 402656 50209->50211 50210->50211 50213 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50210->50213 50211->50204 50211->50211 50213->50211 50215 402664 50214->50215 50216 40266e 50214->50216 50215->50216 50218 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50215->50218 50216->50207 50218->50216 50219->50118 50220->50119 50222 40373c LoadLibraryA 50221->50222 50222->50071 54119 498ba8 54177 403344 54119->54177 54121 498bb6 54180 4056a0 54121->54180 54123 498bbb 54183 40631c GetModuleHandleA GetProcAddress 54123->54183 54127 498bc5 54191 40994c 54127->54191 54459 4032fc 54177->54459 54179 403349 GetModuleHandleA GetCommandLineA 54179->54121 54182 4056db 54180->54182 54460 4033bc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54180->54460 54182->54123 54184 406338 54183->54184 54185 40633f GetProcAddress 54183->54185 54184->54185 54186 406355 GetProcAddress 54185->54186 54187 40634e 54185->54187 54188 406364 SetProcessDEPPolicy 54186->54188 54189 406368 54186->54189 54187->54186 54188->54189 54190 4063c4 6F541CD0 54189->54190 54190->54127 54461 409024 54191->54461 54459->54179 54460->54182 54462 408cbc 5 API calls 54461->54462 54463 409035 54462->54463 54464 4085dc GetSystemDefaultLCID 54463->54464 54467 408612 54464->54467 54465 406dec LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54465->54467 54466 408568 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 54466->54467 54467->54465 54467->54466 54468 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54467->54468 54472 408674 54467->54472 54468->54467 54469 406dec LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54469->54472 54470 408568 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 54470->54472 54471 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54471->54472 54472->54469 54472->54470 54472->54471 54473 4086f7 54472->54473 54474 403420 4 API calls 54473->54474 54475 408711 54474->54475 54476 408720 GetSystemDefaultLCID 54475->54476 54533 408568 GetLocaleInfoA 54476->54533 54479 403450 4 API calls 54480 408760 54479->54480 54481 408568 5 API calls 54480->54481 54482 408775 54481->54482 54483 408568 5 API calls 54482->54483 54484 408799 54483->54484 54539 4085b4 GetLocaleInfoA 54484->54539 54487 4085b4 GetLocaleInfoA 54488 4087c9 54487->54488 54489 408568 5 API calls 54488->54489 54490 4087e3 54489->54490 54491 4085b4 GetLocaleInfoA 54490->54491 54534 4085a1 54533->54534 54535 40858f 54533->54535 54537 403494 4 API calls 54534->54537 54536 4034e0 4 API calls 54535->54536 54538 40859f 54536->54538 54537->54538 54538->54479 54540 4085d0 54539->54540 54540->54487 55894 42f520 55895 42f52b 55894->55895 55896 42f52f NtdllDefWindowProc_A 55894->55896 55896->55895 50223 416b42 50224 416bea 50223->50224 50225 416b5a 50223->50225 50242 41531c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50224->50242 50227 416b74 SendMessageA 50225->50227 50228 416b68 50225->50228 50238 416bc8 50227->50238 50229 416b72 CallWindowProcA 50228->50229 50230 416b8e 50228->50230 50229->50238 50239 41a058 GetSysColor 50230->50239 50233 416b99 SetTextColor 50234 416bae 50233->50234 50240 41a058 GetSysColor 50234->50240 50236 416bb3 SetBkColor 50241 41a6e0 GetSysColor CreateBrushIndirect 50236->50241 50239->50233 50240->50236 50241->50238 50242->50238 55897 4358e0 55898 4358f5 55897->55898 55901 43590f 55898->55901 55903 4352c8 55898->55903 55910 435312 55903->55910 55913 4352f8 55903->55913 55904 403400 4 API calls 55905 435717 55904->55905 55905->55901 55916 435728 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55905->55916 55906 446da4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55906->55913 55907 403744 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55907->55913 55908 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55908->55913 55909 402648 4 API calls 55909->55913 55910->55904 55912 431ca0 4 API calls 55912->55913 55913->55906 55913->55907 55913->55908 55913->55909 55913->55910 55913->55912 55914 4038a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55913->55914 55917 4343b0 55913->55917 55929 434b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55913->55929 55914->55913 55916->55901 55918 43446d 55917->55918 55919 4343dd 55917->55919 55948 434310 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55918->55948 55920 403494 4 API calls 55919->55920 55922 4343eb 55920->55922 55924 403778 4 API calls 55922->55924 55923 43445f 55925 403400 4 API calls 55923->55925 55927 43440c 55924->55927 55926 4344bd 55925->55926 55926->55913 55927->55923 55930 494944 55927->55930 55929->55913 55931 49497c 55930->55931 55932 494a14 55930->55932 55934 403494 4 API calls 55931->55934 55949 448930 55932->55949 55937 494987 55934->55937 55935 494997 55936 403400 4 API calls 55935->55936 55938 494a38 55936->55938 55937->55935 55939 4037b8 4 API calls 55937->55939 55940 403400 4 API calls 55938->55940 55942 4949b0 55939->55942 55941 494a40 55940->55941 55941->55927 55942->55935 55943 4037b8 4 API calls 55942->55943 55944 4949d3 55943->55944 55945 403778 4 API calls 55944->55945 55946 494a04 55945->55946 55947 403634 4 API calls 55946->55947 55947->55932 55948->55923 55950 448955 55949->55950 55951 448998 55949->55951 55952 403494 4 API calls 55950->55952 55954 4489ac 55951->55954 55961 44852c 55951->55961 55953 448960 55952->55953 55958 4037b8 4 API calls 55953->55958 55956 403400 4 API calls 55954->55956 55957 4489df 55956->55957 55957->55935 55959 44897c 55958->55959 55960 4037b8 4 API calls 55959->55960 55960->55951 55962 403494 4 API calls 55961->55962 55963 448562 55962->55963 55964 4037b8 4 API calls 55963->55964 55965 448574 55964->55965 55966 403778 4 API calls 55965->55966 55967 448595 55966->55967 55968 4037b8 4 API calls 55967->55968 55969 4485ad 55968->55969 55970 403778 4 API calls 55969->55970 55971 4485d8 55970->55971 55972 4037b8 4 API calls 55971->55972 55982 4485f0 55972->55982 55973 448628 55975 403420 4 API calls 55973->55975 55974 4486c3 55978 4486cb GetProcAddress 55974->55978 55979 448708 55975->55979 55976 44864b LoadLibraryExA 55976->55982 55977 44865d LoadLibraryA 55977->55982 55980 4486de 55978->55980 55979->55954 55980->55973 55981 403b80 4 API calls 55981->55982 55982->55973 55982->55974 55982->55976 55982->55977 55982->55981 55983 403450 4 API calls 55982->55983 55985 43da88 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55982->55985 55983->55982 55985->55982 50243 402584 50244 402598 50243->50244 50245 4025ab 50243->50245 50273 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50244->50273 50247 4025c2 RtlEnterCriticalSection 50245->50247 50248 4025cc 50245->50248 50247->50248 50259 4023b4 13 API calls 50248->50259 50249 40259d 50249->50245 50251 4025a1 50249->50251 50252 4025d9 50255 402635 50252->50255 50256 40262b RtlLeaveCriticalSection 50252->50256 50253 4025d5 50253->50252 50260 402088 50253->50260 50256->50255 50257 4025e5 50257->50252 50274 402210 9 API calls 50257->50274 50259->50253 50261 40209c 50260->50261 50262 4020af 50260->50262 50281 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50261->50281 50264 4020c6 RtlEnterCriticalSection 50262->50264 50267 4020d0 50262->50267 50264->50267 50265 4020a1 50265->50262 50266 4020a5 50265->50266 50268 402106 50266->50268 50267->50268 50275 401f94 50267->50275 50268->50257 50271 4021f1 RtlLeaveCriticalSection 50272 4021fb 50271->50272 50272->50257 50273->50249 50274->50252 50278 401fa4 50275->50278 50276 401fd0 50280 401ff4 50276->50280 50287 401db4 50276->50287 50278->50276 50278->50280 50282 401f0c 50278->50282 50280->50271 50280->50272 50281->50265 50291 40178c 50282->50291 50286 401f29 50286->50278 50288 401e02 50287->50288 50289 401dd2 50287->50289 50288->50289 50319 401d1c 50288->50319 50289->50280 50297 4017a8 50291->50297 50293 4017b2 50310 401678 VirtualAlloc 50293->50310 50295 40180f 50295->50286 50301 401e80 9 API calls 50295->50301 50297->50293 50297->50295 50299 401803 50297->50299 50302 4014e4 50297->50302 50311 4013e0 LocalAlloc 50297->50311 50298 4017be 50298->50295 50312 4015c0 VirtualFree 50299->50312 50301->50286 50303 4014f3 VirtualAlloc 50302->50303 50305 401520 50303->50305 50306 401543 50303->50306 50313 401398 50305->50313 50306->50297 50309 401530 VirtualFree 50309->50306 50310->50298 50311->50297 50312->50295 50316 401340 50313->50316 50317 40134c LocalAlloc 50316->50317 50318 40135e 50316->50318 50317->50318 50318->50306 50318->50309 50320 401d2e 50319->50320 50321 401d51 50320->50321 50322 401d63 50320->50322 50332 401940 50321->50332 50324 401940 3 API calls 50322->50324 50325 401d61 50324->50325 50326 401d79 50325->50326 50342 401bf8 9 API calls 50325->50342 50326->50289 50328 401d88 50329 401da2 50328->50329 50343 401c4c 9 API calls 50328->50343 50344 401454 LocalAlloc 50329->50344 50333 401966 50332->50333 50341 4019bf 50332->50341 50345 40170c 50333->50345 50337 401983 50338 40199a 50337->50338 50350 4015c0 VirtualFree 50337->50350 50338->50341 50351 401454 LocalAlloc 50338->50351 50341->50325 50342->50328 50343->50329 50344->50326 50347 401743 50345->50347 50346 401783 50349 4013e0 LocalAlloc 50346->50349 50347->50346 50348 40175d VirtualFree 50347->50348 50348->50347 50349->50337 50350->50338 50351->50341 50352 416644 50353 416651 50352->50353 50354 4166ab 50352->50354 50360 416550 CreateWindowExA 50353->50360 50361 4162ca 50353->50361 50355 416658 SetPropA SetPropA 50355->50354 50356 41668b 50355->50356 50357 41669e SetWindowPos 50356->50357 50357->50354 50360->50355 50362 4162f6 50361->50362 50363 4162d6 GetClassInfoA 50361->50363 50362->50355 50363->50362 50364 4162ea GetClassInfoA 50363->50364 50364->50362 55986 4222e4 55987 4222f3 55986->55987 55992 421274 55987->55992 55990 422313 55993 4212e3 55992->55993 55995 421283 55992->55995 55998 4212f4 55993->55998 56017 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 55993->56017 55995->55993 56016 408d2c 19 API calls 55995->56016 55996 4213ba 56000 4213ce SetMenu 55996->56000 56013 421393 55996->56013 55997 421322 56003 421395 55997->56003 56007 42133d 55997->56007 55998->55996 55998->55997 55999 4213e6 56020 4211bc 10 API calls 55999->56020 56000->56013 56005 4213a9 56003->56005 56003->56013 56004 4213ed 56004->55990 56015 4221e8 10 API calls 56004->56015 56008 4213b2 SetMenu 56005->56008 56009 421360 GetMenu 56007->56009 56007->56013 56008->56013 56010 421383 56009->56010 56011 42136a 56009->56011 56018 4124d0 GetMenuItemCount GetMenuStringA GetMenuState 56010->56018 56014 42137d SetMenu 56011->56014 56013->55999 56019 421e2c 11 API calls 56013->56019 56014->56010 56015->55990 56016->55995 56017->55998 56018->56013 56019->55999 56020->56004 56021 44b4a8 56022 44b4b6 56021->56022 56024 44b4d5 56021->56024 56023 44b38c 11 API calls 56022->56023 56022->56024 56023->56024 56025 448728 56026 448756 56025->56026 56027 44875d 56025->56027 56030 403400 4 API calls 56026->56030 56028 448771 56027->56028 56031 44852c 7 API calls 56027->56031 56028->56026 56029 403494 4 API calls 56028->56029 56032 44878a 56029->56032 56033 448907 56030->56033 56031->56028 56034 4037b8 4 API calls 56032->56034 56035 4487a6 56034->56035 56036 4037b8 4 API calls 56035->56036 56037 4487c2 56036->56037 56037->56026 56038 4487d6 56037->56038 56039 4037b8 4 API calls 56038->56039 56040 4487f0 56039->56040 56041 431bd0 4 API calls 56040->56041 56042 448812 56041->56042 56043 448832 56042->56043 56044 431ca0 4 API calls 56042->56044 56045 448870 56043->56045 56068 4435d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56043->56068 56044->56042 56046 448888 56045->56046 56069 4435d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56045->56069 56057 442334 56046->56057 56049 4488bc GetLastError 56070 4484c0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56049->56070 56052 4488cb 56071 443610 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56052->56071 56054 4488e0 56072 443620 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56054->56072 56056 4488e8 56058 443312 56057->56058 56059 44236d 56057->56059 56061 403400 4 API calls 56058->56061 56060 403400 4 API calls 56059->56060 56062 442375 56060->56062 56063 443327 56061->56063 56064 431bd0 4 API calls 56062->56064 56063->56049 56065 442381 56064->56065 56066 443302 56065->56066 56073 441a0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56065->56073 56066->56049 56068->56043 56069->56046 56070->56052 56071->56054 56072->56056 56073->56065 56074 4165ec DestroyWindow 56075 42e3ef SetErrorMode 50365 441394 50366 44139d 50365->50366 50367 4413ab WriteFile 50365->50367 50366->50367 50368 4413b6 50367->50368 50369 416410 50370 416422 50369->50370 50371 416462 GetClassInfoA 50370->50371 50389 408d2c 19 API calls 50370->50389 50372 41648e 50371->50372 50374 4164e9 50372->50374 50375 4164b0 RegisterClassA 50372->50375 50376 4164a0 UnregisterClassA 50372->50376 50380 416506 50374->50380 50383 416517 50374->50383 50375->50374 50378 4164d8 50375->50378 50376->50375 50377 41645d 50377->50371 50390 408cbc 50378->50390 50380->50374 50381 408cbc 5 API calls 50380->50381 50381->50383 50398 407544 50383->50398 50386 416530 50403 41a1e8 50386->50403 50388 41653a 50389->50377 50391 408cc8 50390->50391 50411 406dec LoadStringA 50391->50411 50396 403400 4 API calls 50397 408d0e 50396->50397 50397->50374 50399 407552 50398->50399 50400 407548 50398->50400 50402 418384 7 API calls 50399->50402 50401 402660 4 API calls 50400->50401 50401->50399 50402->50386 50404 41a213 50403->50404 50405 41a2af 50403->50405 50420 403520 50404->50420 50406 403400 4 API calls 50405->50406 50407 41a2c7 50406->50407 50407->50388 50409 41a26b 50410 41a2a3 CreateFontIndirectA 50409->50410 50410->50405 50412 4034e0 4 API calls 50411->50412 50413 406e19 50412->50413 50414 403450 50413->50414 50415 403454 50414->50415 50416 403464 50414->50416 50415->50416 50418 4034bc 4 API calls 50415->50418 50417 403490 50416->50417 50419 402660 4 API calls 50416->50419 50417->50396 50418->50416 50419->50417 50421 4034e0 4 API calls 50420->50421 50422 40352a 50421->50422 50422->50409 56076 491bf8 56077 491c32 56076->56077 56078 491c3e 56077->56078 56079 491c34 56077->56079 56081 491c4d 56078->56081 56082 491c76 56078->56082 56272 409098 MessageBeep 56079->56272 56084 446ff8 18 API calls 56081->56084 56089 491cae 56082->56089 56090 491c85 56082->56090 56083 403420 4 API calls 56085 49228a 56083->56085 56086 491c5a 56084->56086 56087 403400 4 API calls 56085->56087 56273 406bb0 56086->56273 56091 492292 56087->56091 56096 491cbd 56089->56096 56097 491ce6 56089->56097 56093 446ff8 18 API calls 56090->56093 56095 491c92 56093->56095 56281 406c00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56095->56281 56099 446ff8 18 API calls 56096->56099 56104 491d0e 56097->56104 56105 491cf5 56097->56105 56102 491cca 56099->56102 56100 491c9d 56282 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56100->56282 56283 406c34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56102->56283 56111 491d1d 56104->56111 56112 491d42 56104->56112 56285 407280 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCurrentDirectoryA 56105->56285 56107 491cd5 56284 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56107->56284 56108 491cfd 56286 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56108->56286 56113 446ff8 18 API calls 56111->56113 56115 491d7a 56112->56115 56116 491d51 56112->56116 56114 491d2a 56113->56114 56117 4072a8 SetCurrentDirectoryA 56114->56117 56123 491d89 56115->56123 56124 491db2 56115->56124 56118 446ff8 18 API calls 56116->56118 56119 491d32 56117->56119 56120 491d5e 56118->56120 56287 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56119->56287 56122 42c804 5 API calls 56120->56122 56125 491d69 56122->56125 56126 446ff8 18 API calls 56123->56126 56129 491dfe 56124->56129 56130 491dc1 56124->56130 56288 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56125->56288 56128 491d96 56126->56128 56289 4071f8 8 API calls 56128->56289 56136 491e0d 56129->56136 56137 491e36 56129->56137 56132 446ff8 18 API calls 56130->56132 56135 491dd0 56132->56135 56133 491da1 56290 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56133->56290 56138 446ff8 18 API calls 56135->56138 56139 446ff8 18 API calls 56136->56139 56144 491e6e 56137->56144 56145 491e45 56137->56145 56140 491de1 56138->56140 56141 491e1a 56139->56141 56291 4918fc 8 API calls 56140->56291 56143 42c8a4 5 API calls 56141->56143 56147 491e25 56143->56147 56152 491e7d 56144->56152 56153 491ea6 56144->56153 56148 446ff8 18 API calls 56145->56148 56146 491ded 56292 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56146->56292 56293 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56147->56293 56151 491e52 56148->56151 56154 42c8cc 5 API calls 56151->56154 56155 446ff8 18 API calls 56152->56155 56160 491ede 56153->56160 56161 491eb5 56153->56161 56156 491e5d 56154->56156 56158 491e8a 56155->56158 56294 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56156->56294 56295 42c8fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 56158->56295 56167 491eed 56160->56167 56168 491f16 56160->56168 56162 446ff8 18 API calls 56161->56162 56164 491ec2 56162->56164 56163 491e95 56296 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56163->56296 56166 42c92c 5 API calls 56164->56166 56169 491ecd 56166->56169 56170 446ff8 18 API calls 56167->56170 56173 491f62 56168->56173 56174 491f25 56168->56174 56297 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56169->56297 56172 491efa 56170->56172 56175 42c954 5 API calls 56172->56175 56181 491f71 56173->56181 56182 491fb4 56173->56182 56176 446ff8 18 API calls 56174->56176 56177 491f05 56175->56177 56178 491f34 56176->56178 56298 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56177->56298 56180 446ff8 18 API calls 56178->56180 56184 491f45 56180->56184 56183 446ff8 18 API calls 56181->56183 56189 491fc3 56182->56189 56190 492027 56182->56190 56185 491f84 56183->56185 56299 42c4f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 56184->56299 56187 446ff8 18 API calls 56185->56187 56191 491f95 56187->56191 56188 491f51 56300 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56188->56300 56193 446ff8 18 API calls 56189->56193 56197 492066 56190->56197 56198 492036 56190->56198 56301 491af4 12 API calls 56191->56301 56195 491fd0 56193->56195 56264 42c608 7 API calls 56195->56264 56196 491fa3 56302 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56196->56302 56208 4920a5 56197->56208 56209 492075 56197->56209 56201 446ff8 18 API calls 56198->56201 56205 492043 56201->56205 56202 491fde 56203 491fe2 56202->56203 56204 492017 56202->56204 56207 446ff8 18 API calls 56203->56207 56304 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56204->56304 56305 452908 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection DeleteFileA GetLastError 56205->56305 56212 491ff1 56207->56212 56217 4920e4 56208->56217 56218 4920b4 56208->56218 56213 446ff8 18 API calls 56209->56213 56211 492050 56306 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56211->56306 56265 452c80 56212->56265 56216 492082 56213->56216 56221 452770 5 API calls 56216->56221 56228 49212c 56217->56228 56229 4920f3 56217->56229 56222 446ff8 18 API calls 56218->56222 56219 492061 56246 491c39 56219->56246 56220 492001 56303 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56220->56303 56224 49208f 56221->56224 56225 4920c1 56222->56225 56307 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56224->56307 56308 452e10 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection RemoveDirectoryA GetLastError 56225->56308 56234 49213b 56228->56234 56235 492174 56228->56235 56231 446ff8 18 API calls 56229->56231 56230 4920ce 56309 4470d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56230->56309 56233 492102 56231->56233 56236 446ff8 18 API calls 56233->56236 56237 446ff8 18 API calls 56234->56237 56240 492187 56235->56240 56244 49223d 56235->56244 56238 492113 56236->56238 56239 49214a 56237->56239 56242 447278 5 API calls 56238->56242 56241 446ff8 18 API calls 56239->56241 56243 446ff8 18 API calls 56240->56243 56245 49215b 56241->56245 56242->56246 56247 4921b4 56243->56247 56244->56246 56313 446f9c 18 API calls 56244->56313 56251 447278 5 API calls 56245->56251 56246->56083 56248 446ff8 18 API calls 56247->56248 56249 4921cb 56248->56249 56310 407ddc 7 API calls 56249->56310 56251->56246 56252 492256 56253 42e8c8 5 API calls 56252->56253 56254 49225e 56253->56254 56314 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56254->56314 56257 4921ed 56258 446ff8 18 API calls 56257->56258 56259 492201 56258->56259 56311 408508 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56259->56311 56261 49220c 56312 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56261->56312 56263 492218 56264->56202 56266 452724 2 API calls 56265->56266 56268 452c99 56266->56268 56267 452c9d 56267->56220 56268->56267 56269 452cc1 MoveFileA GetLastError 56268->56269 56270 452760 Wow64RevertWow64FsRedirection 56269->56270 56271 452ce7 56270->56271 56271->56220 56272->56246 56274 406bbf 56273->56274 56275 406bd8 56274->56275 56277 406be1 56274->56277 56276 403400 4 API calls 56275->56276 56278 406bdf 56276->56278 56279 403778 4 API calls 56277->56279 56280 44734c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 56278->56280 56279->56278 56280->56246 56281->56100 56282->56246 56283->56107 56284->56246 56285->56108 56286->56246 56287->56246 56288->56246 56289->56133 56290->56246 56291->56146 56292->56246 56293->56246 56294->56246 56295->56163 56296->56246 56297->56246 56298->56246 56299->56188 56300->56246 56301->56196 56302->56246 56303->56246 56304->56246 56305->56211 56306->56219 56307->56246 56308->56230 56309->56246 56310->56257 56311->56261 56312->56263 56313->56252 56314->56246 56315 40cc34 56318 406f10 WriteFile 56315->56318 56319 406f2d 56318->56319 50423 48095d 50428 451004 50423->50428 50425 480971 50438 47fa0c 50425->50438 50427 480995 50429 451011 50428->50429 50431 451065 50429->50431 50447 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50429->50447 50444 450e88 50431->50444 50435 45108d 50436 4510d0 50435->50436 50449 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50435->50449 50436->50425 50454 40b3c8 50438->50454 50440 47fa79 50440->50427 50443 47fa2e 50443->50440 50458 4069dc 50443->50458 50461 476994 50443->50461 50450 450e34 50444->50450 50447->50431 50448 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50448->50435 50449->50436 50451 450e46 50450->50451 50452 450e57 50450->50452 50453 450e4b InterlockedExchange 50451->50453 50452->50435 50452->50448 50453->50452 50455 40b3d3 50454->50455 50456 40b3f3 50455->50456 50477 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50455->50477 50456->50443 50459 402648 4 API calls 50458->50459 50460 4069e7 50459->50460 50460->50443 50471 476a0e 50461->50471 50473 4769c5 50461->50473 50462 476a59 50478 451294 50462->50478 50464 476a70 50466 403420 4 API calls 50464->50466 50468 476a8a 50466->50468 50467 4038a4 4 API calls 50467->50471 50468->50443 50470 403450 4 API calls 50470->50473 50471->50462 50471->50467 50472 403450 4 API calls 50471->50472 50474 403744 4 API calls 50471->50474 50476 451294 21 API calls 50471->50476 50472->50471 50473->50470 50473->50471 50475 451294 21 API calls 50473->50475 50484 4038a4 50473->50484 50493 403744 50473->50493 50474->50471 50475->50473 50476->50471 50477->50456 50479 4512af 50478->50479 50483 4512a4 50478->50483 50497 451238 21 API calls 50479->50497 50481 4512ba 50481->50483 50498 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50481->50498 50483->50464 50485 4038b1 50484->50485 50492 4038e1 50484->50492 50487 4038da 50485->50487 50489 4038bd 50485->50489 50486 403400 4 API calls 50488 4038cb 50486->50488 50490 4034bc 4 API calls 50487->50490 50488->50473 50499 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50489->50499 50490->50492 50492->50486 50494 40374a 50493->50494 50496 40375b 50493->50496 50495 4034bc 4 API calls 50494->50495 50494->50496 50495->50496 50496->50473 50497->50481 50498->50483 50499->50488 50500 41ee54 50501 41ee63 IsWindowVisible 50500->50501 50502 41ee99 50500->50502 50501->50502 50503 41ee6d IsWindowEnabled 50501->50503 50503->50502 50504 41ee77 50503->50504 50505 402648 4 API calls 50504->50505 50506 41ee81 EnableWindow 50505->50506 50506->50502 50507 46bb10 50508 46bb44 50507->50508 50538 46bfad 50507->50538 50512 46bbdc 50508->50512 50513 46bbba 50508->50513 50514 46bbcb 50508->50514 50515 46bb98 50508->50515 50516 46bba9 50508->50516 50525 46bb80 50508->50525 50509 403400 4 API calls 50511 46bfec 50509->50511 50520 403400 4 API calls 50511->50520 50830 46baa0 45 API calls 50512->50830 50563 46b6d0 50513->50563 50829 46b890 67 API calls 50514->50829 50827 46b420 47 API calls 50515->50827 50828 46b588 42 API calls 50516->50828 50524 46bff4 50520->50524 50523 46bb9e 50523->50525 50523->50538 50525->50538 50598 468c74 50525->50598 50526 46bc18 50526->50538 50541 46bc5b 50526->50541 50831 494da0 50526->50831 50529 46bd7e 50850 48358c 123 API calls 50529->50850 50530 414ae8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50530->50541 50533 46bd99 50533->50538 50534 42cbc0 6 API calls 50534->50541 50535 46af68 23 API calls 50535->50541 50538->50509 50539 46bdd7 50616 469f1c 50539->50616 50540 46af68 23 API calls 50540->50538 50541->50529 50541->50530 50541->50534 50541->50535 50541->50538 50541->50539 50542 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50541->50542 50559 46be9f 50541->50559 50601 468bb0 50541->50601 50609 46acd4 50541->50609 50754 483084 50541->50754 50867 46b1dc 19 API calls 50541->50867 50542->50541 50544 46be3d 50545 403450 4 API calls 50544->50545 50546 46be4d 50545->50546 50547 46bea9 50546->50547 50548 46be59 50546->50548 50553 46bf6b 50547->50553 50677 46af68 50547->50677 50851 457f1c 50548->50851 50552 457f1c 24 API calls 50552->50559 50559->50540 50868 46c424 50563->50868 50566 46b852 50568 403420 4 API calls 50566->50568 50570 46b86c 50568->50570 50569 46b71e 50571 46b83e 50569->50571 50875 455f84 13 API calls 50569->50875 50572 403400 4 API calls 50570->50572 50571->50566 50574 403450 4 API calls 50571->50574 50575 46b874 50572->50575 50574->50566 50576 403400 4 API calls 50575->50576 50577 46b87c 50576->50577 50577->50525 50578 46b801 50578->50566 50578->50571 50583 42cd48 7 API calls 50578->50583 50580 46b7a1 50580->50566 50580->50578 50885 42cd48 50580->50885 50582 46b73c 50582->50580 50876 466600 50582->50876 50585 46b817 50583->50585 50585->50571 50590 451458 4 API calls 50585->50590 50593 46b82e 50590->50593 50892 47efd0 42 API calls 50593->50892 50599 468bb0 19 API calls 50598->50599 50600 468c83 50599->50600 50600->50526 50602 468bdf 50601->50602 50603 4078f4 19 API calls 50602->50603 50606 468c20 50602->50606 50604 468c18 50603->50604 51145 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50604->51145 50607 403400 4 API calls 50606->50607 50608 468c38 50607->50608 50608->50541 50610 46ace5 50609->50610 50612 46ace0 50609->50612 51231 469a80 46 API calls 50610->51231 50611 46ace3 50611->50541 50612->50611 51146 46a740 50612->51146 50614 46aced 50614->50541 50617 403400 4 API calls 50616->50617 50618 469f4a 50617->50618 51608 47dd00 50618->51608 50620 469fad 50621 469fb1 50620->50621 50622 469fca 50620->50622 51615 466800 50621->51615 50624 469fbb 50622->50624 51618 494c90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50622->51618 50626 46a25e 50624->50626 50629 46a154 50624->50629 50630 46a0e9 50624->50630 50627 403420 4 API calls 50626->50627 50632 46a288 50627->50632 50628 469fe6 50628->50624 50633 469fee 50628->50633 50631 403494 4 API calls 50629->50631 50634 403494 4 API calls 50630->50634 50636 46a161 50631->50636 50632->50544 50637 46af68 23 API calls 50633->50637 50635 46a0f6 50634->50635 50638 40357c 4 API calls 50635->50638 50639 40357c 4 API calls 50636->50639 50646 469ffb 50637->50646 50640 46a103 50638->50640 50641 46a16e 50639->50641 50642 40357c 4 API calls 50640->50642 50643 40357c 4 API calls 50641->50643 50644 46a110 50642->50644 50645 46a17b 50643->50645 50647 40357c 4 API calls 50644->50647 50648 40357c 4 API calls 50645->50648 50651 46a024 SetActiveWindow 50646->50651 50652 46a03c 50646->50652 50649 46a11d 50647->50649 50650 46a188 50648->50650 50653 466800 20 API calls 50649->50653 50654 40357c 4 API calls 50650->50654 50651->50652 51619 42f560 50652->51619 50655 46a12b 50653->50655 50656 46a196 50654->50656 50658 40357c 4 API calls 50655->50658 50659 414b18 4 API calls 50656->50659 50661 46a134 50658->50661 50662 46a152 50659->50662 50664 40357c 4 API calls 50661->50664 51636 466b38 50662->51636 50667 46a141 50664->50667 50666 46a08d 50669 46ade4 21 API calls 50666->50669 50668 414b18 4 API calls 50667->50668 50668->50662 50670 46a0bf 50669->50670 50670->50544 50678 468c74 19 API calls 50677->50678 50679 46af80 50678->50679 50680 46afa2 50679->50680 50681 4652cc 7 API calls 50679->50681 51821 4652cc 50680->51821 50681->50680 50685 46afba 50686 46ade4 21 API calls 50685->50686 50687 46aff2 50686->50687 50688 414b18 4 API calls 50687->50688 50689 46b006 50688->50689 50690 46b012 50689->50690 50691 46b03c 50689->50691 50692 414b18 4 API calls 50690->50692 50694 46b05b 50691->50694 50695 46b085 50691->50695 50693 46b026 50692->50693 50696 414b18 4 API calls 50693->50696 50697 414b18 4 API calls 50694->50697 50698 414b18 4 API calls 50695->50698 50701 46b06f 50697->50701 50699 46b099 50698->50699 50755 46c424 48 API calls 50754->50755 50756 4830c7 50755->50756 50757 4830d0 50756->50757 52097 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 50756->52097 50759 414ae8 4 API calls 50757->50759 50760 4830e0 50759->50760 50761 403450 4 API calls 50760->50761 50762 4830ed 50761->50762 51899 46c77c 50762->51899 50765 4830fd 50767 414ae8 4 API calls 50765->50767 50768 48310d 50767->50768 50769 403450 4 API calls 50768->50769 50770 48311a 50769->50770 50771 469868 SendMessageA 50770->50771 50772 483133 50771->50772 50773 483184 50772->50773 52099 479e18 23 API calls 50772->52099 51928 4241dc IsIconic 50773->51928 50777 48319f SetActiveWindow 50778 4831b4 50777->50778 51936 4824b4 50778->51936 50827->50523 50828->50525 50829->50525 50830->50525 53752 43d9c8 50831->53752 50834 494dcc 53757 431bd0 50834->53757 50835 494e52 50836 494e61 50835->50836 53790 4945c8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50835->53790 50836->50541 50845 494e16 53788 49465c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50845->53788 50847 494e2a 53789 433dd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50847->53789 50849 494e4a 50849->50541 50850->50533 50852 457f41 50851->50852 50853 457f61 50852->50853 50854 4078f4 19 API calls 50852->50854 50855 403400 4 API calls 50853->50855 50856 457f59 50854->50856 50857 457f76 50855->50857 50858 457d10 24 API calls 50856->50858 50857->50552 50858->50853 50867->50541 50893 46c4bc 50868->50893 50871 414ae8 50872 414af6 50871->50872 50873 4034e0 4 API calls 50872->50873 50874 414b03 50873->50874 50874->50569 50875->50582 50877 46661a 50876->50877 51096 4078f4 50877->51096 51139 42cccc 50885->51139 50888 451458 50889 451428 4 API calls 50888->50889 50890 451474 50889->50890 50892->50571 50894 414ae8 4 API calls 50893->50894 50895 46c4f0 50894->50895 50954 466898 50895->50954 50899 46c502 50900 46c511 50899->50900 50903 46c52a 50899->50903 51023 47efd0 42 API calls 50900->51023 50902 403420 4 API calls 50905 46b702 50902->50905 50904 46c571 50903->50904 50906 46c558 50903->50906 50907 46c5d6 50904->50907 50912 46c575 50904->50912 50905->50566 50905->50871 51024 47efd0 42 API calls 50906->51024 51026 42cb4c CharNextA 50907->51026 50910 46c5e5 50911 46c5e9 50910->50911 50916 46c602 50910->50916 51027 47efd0 42 API calls 50911->51027 50914 46c5bd 50912->50914 50912->50916 51025 47efd0 42 API calls 50914->51025 50915 46c626 51028 47efd0 42 API calls 50915->51028 50916->50915 50968 466a08 50916->50968 50921 46c525 50921->50902 50924 46c63f 50976 403778 50924->50976 50929 46c666 51029 466a94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50929->51029 50930 46c697 50987 42c8cc 50930->50987 50933 46c679 50935 451458 4 API calls 50933->50935 50937 46c686 50935->50937 51030 47efd0 42 API calls 50937->51030 50958 4668b2 50954->50958 50955 406bb0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50955->50958 50957 42cbc0 6 API calls 50957->50958 50958->50955 50958->50957 50959 403450 4 API calls 50958->50959 50960 4668fb 50958->50960 51033 42caac 50958->51033 50959->50958 50961 403420 4 API calls 50960->50961 50962 466915 50961->50962 50963 414b18 50962->50963 50964 414ae8 4 API calls 50963->50964 50965 414b3c 50964->50965 50966 403400 4 API calls 50965->50966 50967 414b6d 50966->50967 50967->50899 50969 466a12 50968->50969 50970 466a25 50969->50970 51049 42cb3c CharNextA 50969->51049 50970->50915 50972 466a38 50970->50972 50973 466a42 50972->50973 50974 466a6f 50973->50974 51050 42cb3c CharNextA 50973->51050 50974->50915 50974->50924 50977 4037aa 50976->50977 50978 40377d 50976->50978 50979 403400 4 API calls 50977->50979 50978->50977 50980 403791 50978->50980 50982 4037a0 50979->50982 50981 4034e0 4 API calls 50980->50981 50981->50982 50983 42c99c 50982->50983 50984 42c9f5 50983->50984 50985 42c9b2 50983->50985 50984->50929 50984->50930 50985->50984 51051 42cb3c CharNextA 50985->51051 51052 42c674 50987->51052 51023->50921 51024->50921 51025->50921 51026->50910 51027->50921 51028->50921 51029->50933 51030->50921 51034 403494 4 API calls 51033->51034 51035 42cabc 51034->51035 51036 403744 4 API calls 51035->51036 51038 42caf2 51035->51038 51042 42c444 IsDBCSLeadByte 51035->51042 51036->51035 51039 42cb36 51038->51039 51043 4037b8 51038->51043 51048 42c444 IsDBCSLeadByte 51038->51048 51039->50958 51042->51035 51044 403744 4 API calls 51043->51044 51046 4037c6 51044->51046 51045 4037fc 51045->51038 51046->51045 51047 4038a4 4 API calls 51046->51047 51047->51045 51048->51038 51049->50969 51050->50973 51051->50985 51055 42c67c 51052->51055 51058 42c68d 51055->51058 51056 42c6f1 51058->51056 51061 42c6ab 51058->51061 51099 407908 51096->51099 51100 407925 51099->51100 51107 4075b8 51100->51107 51103 407951 51105 4034e0 4 API calls 51103->51105 51106 407903 51105->51106 51110 4075d3 51107->51110 51108 4075e5 51108->51103 51112 4069a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51108->51112 51110->51108 51113 4076da 19 API calls 51110->51113 51114 4075ac LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51110->51114 51112->51103 51113->51110 51114->51110 51140 42cbc0 6 API calls 51139->51140 51141 42ccee 51140->51141 51142 42ccf6 GetFileAttributesA 51141->51142 51143 403400 4 API calls 51142->51143 51144 42cd13 51143->51144 51144->50578 51144->50888 51145->50606 51148 46a787 51146->51148 51147 46abff 51150 46ac1a 51147->51150 51151 46ac4b 51147->51151 51148->51147 51149 46a842 51148->51149 51152 403494 4 API calls 51148->51152 51155 46a863 51149->51155 51156 46a8a4 51149->51156 51153 403494 4 API calls 51150->51153 51154 403494 4 API calls 51151->51154 51158 46a7c6 51152->51158 51159 46ac28 51153->51159 51160 46ac59 51154->51160 51157 403494 4 API calls 51155->51157 51164 403400 4 API calls 51156->51164 51161 46a871 51157->51161 51162 414ae8 4 API calls 51158->51162 51258 46915c 12 API calls 51159->51258 51259 46915c 12 API calls 51160->51259 51166 414ae8 4 API calls 51161->51166 51167 46a7e7 51162->51167 51168 46a8a2 51164->51168 51170 46a892 51166->51170 51232 403634 51167->51232 51187 46a988 51168->51187 51238 469868 51168->51238 51169 46ac36 51172 403400 4 API calls 51169->51172 51173 403634 4 API calls 51170->51173 51176 46ac7c 51172->51176 51173->51168 51181 403400 4 API calls 51176->51181 51177 46aa10 51179 403400 4 API calls 51177->51179 51195 46aa0e 51179->51195 51180 46a8c4 51184 46a902 51180->51184 51185 46a8ca 51180->51185 51182 46ac84 51181->51182 51186 403420 4 API calls 51182->51186 51188 403400 4 API calls 51184->51188 51189 403494 4 API calls 51185->51189 51191 46ac91 51186->51191 51187->51177 51192 46a9cf 51187->51192 51193 46a900 51188->51193 51190 46a8d8 51189->51190 51244 47c26c 51190->51244 51191->50611 51198 403494 4 API calls 51192->51198 51247 469b5c 51193->51247 51253 469ca4 43 API calls 51195->51253 51202 46a9dd 51198->51202 51200 46aa39 51208 46aa44 51200->51208 51209 46aa9a 51200->51209 51201 46a8f0 51204 403634 4 API calls 51201->51204 51205 414ae8 4 API calls 51202->51205 51204->51193 51207 46a9fe 51205->51207 51210 403634 4 API calls 51207->51210 51212 403494 4 API calls 51208->51212 51211 403400 4 API calls 51209->51211 51210->51195 51218 46aaa2 51211->51218 51220 46aa52 51212->51220 51213 46a929 51214 46a934 51213->51214 51215 46a98a 51213->51215 51217 403494 4 API calls 51214->51217 51216 403400 4 API calls 51215->51216 51216->51187 51222 46a942 51217->51222 51230 46ab4b 51218->51230 51254 494c90 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51218->51254 51220->51218 51224 403634 4 API calls 51220->51224 51226 46aa98 51220->51226 51221 46aac5 51221->51230 51255 494f3c 18 API calls 51221->51255 51222->51187 51225 403634 4 API calls 51222->51225 51224->51220 51225->51222 51226->51218 51228 46abec 51257 429144 SendMessageA SendMessageA 51228->51257 51256 4290f4 SendMessageA 51230->51256 51231->50614 51233 40363c 51232->51233 51234 4034bc 4 API calls 51233->51234 51235 40364f 51234->51235 51236 403450 4 API calls 51235->51236 51237 403677 51236->51237 51260 42a040 SendMessageA 51238->51260 51240 469897 51240->51180 51241 469877 51241->51240 51261 42a040 SendMessageA 51241->51261 51243 469887 51243->51180 51262 47c2b4 51244->51262 51251 469b89 51247->51251 51248 469beb 51249 403400 4 API calls 51248->51249 51250 469c00 51249->51250 51250->51213 51251->51248 51607 469ae0 43 API calls 51251->51607 51253->51200 51254->51221 51255->51230 51256->51228 51257->51147 51258->51169 51259->51169 51260->51241 51261->51243 51263 403494 4 API calls 51262->51263 51270 47c2e7 51263->51270 51264 47c3f9 51265 403420 4 API calls 51264->51265 51266 47c289 51265->51266 51266->51201 51268 403778 4 API calls 51268->51270 51270->51264 51270->51268 51273 4037b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51270->51273 51274 47b100 51270->51274 51518 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51270->51518 51519 403800 51270->51519 51523 42c97c CharPrevA 51270->51523 51273->51270 51275 47b152 51274->51275 51276 47b130 51274->51276 51277 47b172 51275->51277 51278 47b160 51275->51278 51276->51275 51528 47a030 19 API calls 51276->51528 51281 47b1d5 51277->51281 51282 47b180 51277->51282 51279 403494 4 API calls 51278->51279 51333 47b16d 51279->51333 51291 47b1f6 51281->51291 51292 47b1e3 51281->51292 51284 47b1af 51282->51284 51285 47b189 51282->51285 51283 403400 4 API calls 51286 47baf8 51283->51286 51288 47b1c2 51284->51288 51530 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51284->51530 51287 47b19c 51285->51287 51529 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51285->51529 51290 403400 4 API calls 51286->51290 51294 403494 4 API calls 51287->51294 51289 403494 4 API calls 51288->51289 51289->51333 51296 47bb00 51290->51296 51298 47b217 51291->51298 51299 47b204 51291->51299 51297 403494 4 API calls 51292->51297 51294->51333 51296->51270 51297->51333 51301 47b267 51298->51301 51302 47b225 51298->51302 51300 403494 4 API calls 51299->51300 51300->51333 51309 47b275 51301->51309 51310 47b288 51301->51310 51303 47b241 51302->51303 51304 47b22e 51302->51304 51306 47b254 51303->51306 51531 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51303->51531 51305 403494 4 API calls 51304->51305 51305->51333 51308 403494 4 API calls 51306->51308 51308->51333 51311 403494 4 API calls 51309->51311 51312 47b296 51310->51312 51313 47b2a9 51310->51313 51311->51333 51314 403494 4 API calls 51312->51314 51315 47b2b7 51313->51315 51316 47b2ca 51313->51316 51314->51333 51317 403494 4 API calls 51315->51317 51318 47b2eb 51316->51318 51319 47b2d8 51316->51319 51317->51333 51321 47b327 51318->51321 51322 47b2f9 51318->51322 51320 403494 4 API calls 51319->51320 51320->51333 51327 47b335 51321->51327 51330 47b364 51321->51330 51323 47b315 51322->51323 51324 47b302 51322->51324 51326 47c26c 43 API calls 51323->51326 51325 403494 4 API calls 51324->51325 51325->51333 51326->51333 51334 47b372 51330->51334 51335 47b3a0 51330->51335 51333->51283 51518->51270 51520 40382f 51519->51520 51521 403804 51519->51521 51520->51270 51522 4038a4 4 API calls 51521->51522 51522->51520 51523->51270 51528->51276 51529->51287 51530->51288 51531->51306 51607->51251 51609 47dd56 51608->51609 51610 47dd19 51608->51610 51609->50620 51640 455d0c 51610->51640 51614 47dd6d 51614->50620 51759 466714 51615->51759 51618->50628 51620 42f56c 51619->51620 51621 42f58f GetActiveWindow GetFocus 51620->51621 51622 41eea4 2 API calls 51621->51622 51623 42f5a6 51622->51623 51624 42f5c3 51623->51624 51625 42f5b3 RegisterClassA 51623->51625 51626 42f652 SetFocus 51624->51626 51627 42f5d1 CreateWindowExA 51624->51627 51625->51624 51628 403400 4 API calls 51626->51628 51627->51626 51629 42f604 51627->51629 51630 42f66e 51628->51630 51790 42427c 51629->51790 51635 494f3c 18 API calls 51630->51635 51632 42f62c 51633 42f634 CreateWindowExA 51632->51633 51633->51626 51634 42f64a ShowWindow 51633->51634 51634->51626 51635->50666 51796 44b514 51636->51796 51641 455d1d 51640->51641 51642 455d21 51641->51642 51643 455d2a 51641->51643 51666 455a10 51642->51666 51674 455af0 29 API calls 51643->51674 51646 455d27 51646->51609 51647 47d970 51646->51647 51652 47da6c 51647->51652 51654 47d9b0 51647->51654 51648 403420 4 API calls 51649 47db4f 51648->51649 51649->51614 51659 47dabd 51652->51659 51662 47da0f 51652->51662 51729 479630 51652->51729 51654->51652 51655 47da18 51654->51655 51658 47c26c 43 API calls 51654->51658 51654->51662 51703 479770 51654->51703 51714 4798d4 51654->51714 51655->51654 51660 47c26c 43 API calls 51655->51660 51665 47da59 51655->51665 51718 42c92c 51655->51718 51723 42c954 51655->51723 51728 47d67c 52 API calls 51655->51728 51656 47c26c 43 API calls 51656->51659 51657 454100 20 API calls 51657->51659 51658->51654 51659->51652 51659->51656 51659->51657 51659->51665 51660->51655 51662->51648 51665->51662 51675 42de1c 51666->51675 51668 455a2d 51669 455a7b 51668->51669 51678 455944 51668->51678 51669->51646 51672 455944 6 API calls 51673 455a5c RegCloseKey 51672->51673 51673->51646 51674->51646 51676 42de27 51675->51676 51677 42de2d RegOpenKeyExA 51675->51677 51676->51677 51677->51668 51683 42dd58 51678->51683 51680 403420 4 API calls 51681 4559f6 51680->51681 51681->51672 51682 45596c 51682->51680 51686 42dc00 51683->51686 51687 42dc26 RegQueryValueExA 51686->51687 51692 42dc49 51687->51692 51702 42dc6b 51687->51702 51688 403400 4 API calls 51690 42dd37 51688->51690 51689 42dc63 51691 403400 4 API calls 51689->51691 51690->51682 51691->51702 51692->51689 51693 4034e0 4 API calls 51692->51693 51694 403744 4 API calls 51692->51694 51692->51702 51693->51692 51695 42dca0 RegQueryValueExA 51694->51695 51695->51687 51696 42dcbc 51695->51696 51697 4038a4 4 API calls 51696->51697 51696->51702 51698 42dcfe 51697->51698 51699 42dd10 51698->51699 51701 403744 4 API calls 51698->51701 51700 403450 4 API calls 51699->51700 51700->51702 51701->51699 51702->51688 51704 479786 51703->51704 51705 479782 51703->51705 51706 403450 4 API calls 51704->51706 51705->51654 51707 479793 51706->51707 51708 4797b3 51707->51708 51709 479799 51707->51709 51711 479630 19 API calls 51708->51711 51710 479630 19 API calls 51709->51710 51712 4797af 51710->51712 51711->51712 51713 403400 4 API calls 51712->51713 51713->51705 51715 4798e0 51714->51715 51716 4798fb 51715->51716 51741 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51715->51741 51716->51654 51742 42c79c 51718->51742 51721 403778 4 API calls 51722 42c94e 51721->51722 51722->51655 51724 42c79c IsDBCSLeadByte 51723->51724 51725 42c964 51724->51725 51726 403778 4 API calls 51725->51726 51727 42c975 51726->51727 51727->51655 51728->51655 51730 47964b 51729->51730 51733 47967c 51730->51733 51740 47970a 51730->51740 51754 4794e4 19 API calls 51730->51754 51731 4796a1 51736 4796c2 51731->51736 51756 4794e4 19 API calls 51731->51756 51733->51731 51755 4794e4 19 API calls 51733->51755 51737 479702 51736->51737 51736->51740 51757 453344 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51736->51757 51748 479368 51737->51748 51740->51652 51741->51716 51743 42c67c IsDBCSLeadByte 51742->51743 51745 42c7b1 51743->51745 51744 42c7fb 51744->51721 51745->51744 51747 42c444 IsDBCSLeadByte 51745->51747 51747->51745 51749 4793a3 51748->51749 51750 403450 4 API calls 51749->51750 51751 4793c8 51750->51751 51758 477a58 19 API calls 51751->51758 51753 479409 51753->51740 51754->51733 51755->51731 51756->51736 51757->51737 51758->51753 51760 403494 4 API calls 51759->51760 51761 466742 51760->51761 51776 42dbc8 51761->51776 51764 42dbc8 5 API calls 51765 466766 51764->51765 51766 466600 19 API calls 51765->51766 51767 466770 51766->51767 51768 42dbc8 5 API calls 51767->51768 51769 46677f 51768->51769 51779 466678 51769->51779 51772 42dbc8 5 API calls 51773 466798 51772->51773 51774 403400 4 API calls 51773->51774 51775 4667ad 51774->51775 51775->50624 51783 42db10 51776->51783 51780 466698 51779->51780 51781 4078f4 19 API calls 51780->51781 51782 4666e2 51781->51782 51782->51772 51784 42dbbb 51783->51784 51785 42db30 51783->51785 51784->51764 51785->51784 51786 4037b8 4 API calls 51785->51786 51788 403800 4 API calls 51785->51788 51789 42c444 IsDBCSLeadByte 51785->51789 51786->51785 51788->51785 51789->51785 51791 4242ae 51790->51791 51792 42428e GetWindowTextA 51790->51792 51794 403494 4 API calls 51791->51794 51793 4034e0 4 API calls 51792->51793 51795 4242ac 51793->51795 51794->51795 51795->51632 51799 44b38c 51796->51799 51800 44b3bf 51799->51800 51801 414ae8 4 API calls 51800->51801 51802 44b3d2 51801->51802 51803 44b3ff GetDC 51802->51803 51804 40357c 4 API calls 51802->51804 51805 41a1e8 5 API calls 51803->51805 51804->51803 51806 44b41f SelectObject 51805->51806 51807 44b430 51806->51807 51810 44b0c0 51807->51810 51811 44b0d7 51810->51811 51824 4652d7 51821->51824 51822 4653b2 51832 46708c 51822->51832 51823 46536a 51823->51822 51850 4185b8 7 API calls 51823->51850 51824->51822 51827 465327 51824->51827 51844 421a1c 51824->51844 51827->51823 51828 465361 51827->51828 51829 46536c 51827->51829 51830 421a1c 7 API calls 51828->51830 51831 421a1c 7 API calls 51829->51831 51830->51823 51831->51823 51833 4670bc 51832->51833 51834 46709d 51832->51834 51833->50685 51835 414b18 4 API calls 51834->51835 51836 4670ab 51835->51836 51837 414b18 4 API calls 51836->51837 51837->51833 51845 421a74 51844->51845 51846 421a2a 51844->51846 51845->51827 51847 408cbc 5 API calls 51846->51847 51849 421a59 51846->51849 51847->51849 51849->51845 51851 421d28 SetFocus GetFocus 51849->51851 51850->51822 51851->51845 51900 46c7a5 51899->51900 51901 414ae8 4 API calls 51900->51901 51916 46c7f2 51900->51916 51902 46c7bb 51901->51902 52106 466924 6 API calls 51902->52106 51903 403420 4 API calls 51905 46c89c 51903->51905 51905->50765 52098 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51905->52098 51906 46c7c3 51907 414b18 4 API calls 51906->51907 51908 46c7d1 51907->51908 51909 46c7de 51908->51909 51911 46c7f7 51908->51911 52107 47efd0 42 API calls 51909->52107 51912 46c80f 51911->51912 51914 466a08 CharNextA 51911->51914 52108 47efd0 42 API calls 51912->52108 51915 46c80b 51914->51915 51915->51912 51917 46c825 51915->51917 51916->51903 51918 46c841 51917->51918 51919 46c82b 51917->51919 51921 42c99c CharNextA 51918->51921 52109 47efd0 42 API calls 51919->52109 51922 46c84e 51921->51922 51922->51916 52110 466a94 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51922->52110 51924 46c865 51925 451458 4 API calls 51924->51925 51926 46c872 51925->51926 52111 47efd0 42 API calls 51926->52111 51929 4241ed SetActiveWindow 51928->51929 51933 424223 51928->51933 52112 42364c 51929->52112 51933->50777 51933->50778 51934 42420a 51934->51933 51935 42421d SetFocus 51934->51935 51935->51933 51937 482505 51936->51937 51938 4824d7 51936->51938 51940 475bd0 51937->51940 52125 494cec 18 API calls 51938->52125 52126 457d10 51940->52126 52099->50773 52106->51906 52107->51916 52108->51916 52109->51916 52110->51924 52111->51916 52121 4235f8 SystemParametersInfoA 52112->52121 52115 423665 ShowWindow 52117 423670 52115->52117 52118 423677 52115->52118 52124 423628 SystemParametersInfoA 52117->52124 52120 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 52118->52120 52120->51934 52122 423616 52121->52122 52122->52115 52123 423628 SystemParametersInfoA 52122->52123 52123->52115 52124->52118 52125->51937 52127 457e44 52126->52127 52128 457d3c 52126->52128 52129 457e95 52127->52129 52602 45757c 6 API calls 52127->52602 52598 457a0c GetSystemTimeAsFileTime FileTimeToSystemTime 52128->52598 52132 403400 4 API calls 52129->52132 52134 457eaa 52132->52134 52133 457d44 52135 4078f4 19 API calls 52133->52135 52147 4072a8 52134->52147 52136 457db5 52135->52136 52599 457d00 20 API calls 52136->52599 52148 403738 52147->52148 52598->52133 52602->52129 53791 431eec 53752->53791 53754 43d9f2 53755 403400 4 API calls 53754->53755 53756 43da76 53755->53756 53756->50834 53756->50835 53758 431bd6 53757->53758 53759 402648 4 API calls 53758->53759 53760 431c06 53759->53760 53761 4947f8 53760->53761 53762 4948cd 53761->53762 53763 494812 53761->53763 53768 494910 53762->53768 53763->53762 53765 433d6c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53763->53765 53767 403450 4 API calls 53763->53767 53796 408c0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53763->53796 53797 431ca0 53763->53797 53765->53763 53767->53763 53769 49492c 53768->53769 53805 433d6c 53769->53805 53771 494931 53772 431ca0 4 API calls 53771->53772 53773 49493c 53772->53773 53774 43d594 53773->53774 53775 43d5c1 53774->53775 53776 43d5b3 53774->53776 53775->50845 53776->53775 53777 43d63d 53776->53777 53781 447084 4 API calls 53776->53781 53784 43d6f7 53777->53784 53808 447084 53777->53808 53779 43d688 53814 43dd50 53779->53814 53781->53776 53782 43d8fd 53782->53775 53834 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53782->53834 53784->53782 53785 43d8de 53784->53785 53832 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53784->53832 53833 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53785->53833 53788->50847 53789->50849 53790->50836 53792 403494 4 API calls 53791->53792 53794 431efb 53792->53794 53793 431f25 53793->53754 53794->53793 53795 403744 4 API calls 53794->53795 53795->53794 53796->53763 53798 431cc0 53797->53798 53799 431cae 53797->53799 53801 431ce2 53798->53801 53804 431c40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53798->53804 53803 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53799->53803 53801->53763 53803->53798 53804->53801 53806 402648 4 API calls 53805->53806 53807 433d7b 53806->53807 53807->53771 53809 4470a3 53808->53809 53810 4470aa 53808->53810 53835 446e30 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53809->53835 53812 431ca0 4 API calls 53810->53812 53813 4470ba 53812->53813 53813->53779 53815 43dd6c 53814->53815 53821 43dd99 53814->53821 53816 402660 4 API calls 53815->53816 53815->53821 53816->53815 53817 43ddce 53817->53784 53819 43fea5 53819->53817 53820 43c938 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53820->53821 53821->53817 53821->53819 53821->53820 53822 447024 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53821->53822 53824 433b18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53821->53824 53827 446e30 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53821->53827 53829 433d18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53821->53829 53830 436650 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53821->53830 53831 431c40 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53821->53831 53836 4396e0 53821->53836 53842 436e4c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53821->53842 53843 43dc48 18 API calls 53821->53843 53844 433d34 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53821->53844 53822->53821 53824->53821 53827->53821 53829->53821 53830->53821 53831->53821 53832->53784 53833->53782 53834->53782 53835->53810 53842->53821 53843->53821 53844->53821 53848 41fb58 53849 41fb61 53848->53849 53852 41fdfc 53849->53852 53851 41fb6e 53853 41feee 53852->53853 53854 41fe13 53852->53854 53853->53851 53854->53853 53873 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53854->53873 53856 41fe49 53857 41fe73 53856->53857 53858 41fe4d 53856->53858 53883 41f9bc GetWindowLongA GetSystemMetrics GetSystemMetrics GetWindowLongA 53857->53883 53874 41fb9c 53858->53874 53862 41fe81 53864 41fe85 53862->53864 53865 41feab 53862->53865 53863 41fb9c 10 API calls 53868 41fe71 53863->53868 53866 41fb9c 10 API calls 53864->53866 53867 41fb9c 10 API calls 53865->53867 53869 41fe97 53866->53869 53870 41febd 53867->53870 53868->53851 53872 41fb9c 10 API calls 53869->53872 53871 41fb9c 10 API calls 53870->53871 53871->53868 53872->53868 53873->53856 53875 41fbb7 53874->53875 53876 41fbcd 53875->53876 53877 41f93c 4 API calls 53875->53877 53884 41f93c 53876->53884 53877->53876 53879 41fc15 53880 41fc38 SetScrollInfo 53879->53880 53892 41fa9c 53880->53892 53883->53862 53885 4181e0 53884->53885 53886 41f959 GetWindowLongA 53885->53886 53887 41f996 53886->53887 53888 41f976 53886->53888 53904 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 53887->53904 53903 41f8c8 GetWindowLongA GetSystemMetrics GetSystemMetrics 53888->53903 53891 41f982 53891->53879 53893 41faaa 53892->53893 53894 41fab2 53892->53894 53893->53863 53895 41faf1 53894->53895 53896 41fae1 53894->53896 53900 41faef 53894->53900 53906 417e48 IsWindowVisible ScrollWindow SetWindowPos 53895->53906 53905 417e48 IsWindowVisible ScrollWindow SetWindowPos 53896->53905 53897 41fb31 GetScrollPos 53897->53893 53901 41fb3c 53897->53901 53900->53897 53902 41fb4b SetScrollPos 53901->53902 53902->53893 53903->53891 53904->53891 53905->53900 53906->53900 53907 420598 53908 4205ab 53907->53908 53928 415b30 53908->53928 53910 4206f2 53911 420709 53910->53911 53935 4146d4 KiUserCallbackDispatcher 53910->53935 53915 420720 53911->53915 53936 414718 KiUserCallbackDispatcher 53911->53936 53912 420651 53933 420848 20 API calls 53912->53933 53913 4205e6 53913->53910 53913->53912 53921 420642 MulDiv 53913->53921 53917 420742 53915->53917 53937 420060 12 API calls 53915->53937 53919 42066a 53919->53910 53934 420060 12 API calls 53919->53934 53932 41a304 LocalAlloc TlsSetValue TlsGetValue TlsGetValue DeleteObject 53921->53932 53924 420687 53925 4206a3 MulDiv 53924->53925 53926 4206c6 53924->53926 53925->53926 53926->53910 53927 4206cf MulDiv 53926->53927 53927->53910 53929 415b42 53928->53929 53938 414470 53929->53938 53931 415b5a 53931->53913 53932->53912 53933->53919 53934->53924 53935->53911 53936->53915 53937->53917 53939 41448a 53938->53939 53942 410458 53939->53942 53941 4144a0 53941->53931 53945 40dca4 53942->53945 53944 41045e 53944->53941 53946 40dd06 53945->53946 53947 40dcb7 53945->53947 53952 40dd14 53946->53952 53950 40dd14 19 API calls 53947->53950 53951 40dce1 53950->53951 53951->53944 53954 40dd24 53952->53954 53955 40dd3a 53954->53955 53964 40e09c 53954->53964 53980 40d5e0 53954->53980 53983 40df4c 53955->53983 53958 40d5e0 5 API calls 53959 40dd42 53958->53959 53959->53958 53960 40ddae 53959->53960 53986 40db60 53959->53986 53961 40df4c 5 API calls 53960->53961 53963 40dd10 53961->53963 53963->53944 54000 40e96c 53964->54000 53966 403778 4 API calls 53968 40e0d7 53966->53968 53967 40e18d 53969 40e1b7 53967->53969 53970 40e1a8 53967->53970 53968->53966 53968->53967 54063 40d774 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53968->54063 54064 40e080 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 53968->54064 54060 40ba24 53969->54060 54009 40e3c0 53970->54009 53976 40e1b5 53977 403400 4 API calls 53976->53977 53978 40e25c 53977->53978 53978->53954 53981 40ea08 5 API calls 53980->53981 53982 40d5ea 53981->53982 53982->53954 54097 40d4bc 53983->54097 54106 40df54 53986->54106 53989 40e96c 5 API calls 53990 40db9e 53989->53990 53991 40e96c 5 API calls 53990->53991 53992 40dba9 53991->53992 53993 40dbc4 53992->53993 53994 40dbbb 53992->53994 53999 40dbc1 53992->53999 54113 40d9d8 53993->54113 54116 40dac8 19 API calls 53994->54116 53997 403420 4 API calls 53998 40dc8f 53997->53998 53998->53959 53999->53997 54066 40d780 54000->54066 54003 4034e0 4 API calls 54004 40e98f 54003->54004 54005 403744 4 API calls 54004->54005 54006 40e996 54005->54006 54007 40d780 5 API calls 54006->54007 54008 40e9a4 54007->54008 54008->53968 54010 40e3ec 54009->54010 54012 40e3f6 54009->54012 54071 40d440 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54010->54071 54013 40e511 54012->54013 54014 40e495 54012->54014 54015 40e4f6 54012->54015 54016 40e576 54012->54016 54017 40e438 54012->54017 54018 40e4d9 54012->54018 54019 40e47a 54012->54019 54020 40e4bb 54012->54020 54031 40e45c 54012->54031 54023 40d764 5 API calls 54013->54023 54079 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54014->54079 54084 40e890 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54015->54084 54027 40d764 5 API calls 54016->54027 54072 40d764 54017->54072 54082 40e9a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54018->54082 54078 40d818 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54019->54078 54081 40dde4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54020->54081 54032 40e519 54023->54032 54026 403400 4 API calls 54033 40e5eb 54026->54033 54034 40e57e 54027->54034 54030 40e4a0 54080 40d470 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54030->54080 54031->54026 54040 40e523 54032->54040 54041 40e51d 54032->54041 54033->53976 54042 40e582 54034->54042 54043 40e59b 54034->54043 54035 40e4e4 54083 409d38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54035->54083 54037 40e461 54077 40ded8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54037->54077 54038 40e444 54075 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54038->54075 54085 40ea08 54040->54085 54048 40e521 54041->54048 54049 40e53c 54041->54049 54051 40ea08 5 API calls 54042->54051 54091 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54043->54091 54089 40de24 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54048->54089 54052 40ea08 5 API calls 54049->54052 54051->54031 54054 40e544 54052->54054 54053 40e44f 54076 40e26c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54053->54076 54088 40d8a0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54054->54088 54057 40e566 54090 40e2d4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54057->54090 54092 40b9d0 54060->54092 54063->53968 54064->53968 54065 40d774 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54065->53976 54069 40d78b 54066->54069 54067 40d7c5 54067->54003 54069->54067 54070 40d7cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54069->54070 54070->54069 54071->54012 54073 40ea08 5 API calls 54072->54073 54074 40d76e 54073->54074 54074->54037 54074->54038 54075->54053 54076->54031 54077->54031 54078->54031 54079->54030 54080->54031 54081->54031 54082->54035 54083->54031 54084->54031 54086 40d780 5 API calls 54085->54086 54087 40ea15 54086->54087 54087->54031 54088->54031 54089->54057 54090->54031 54091->54031 54093 40b9e2 54092->54093 54095 40ba07 54092->54095 54093->54095 54096 40ba84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 54093->54096 54095->53976 54095->54065 54096->54095 54098 40ea08 5 API calls 54097->54098 54099 40d4c9 54098->54099 54100 40d4dc 54099->54100 54104 40eb0c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54099->54104 54100->53959 54102 40d4d7 54105 40d458 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54102->54105 54104->54102 54105->54100 54107 40d764 5 API calls 54106->54107 54108 40df6b 54107->54108 54109 40db93 54108->54109 54110 40ea08 5 API calls 54108->54110 54109->53989 54111 40df78 54110->54111 54111->54109 54117 40ded8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 54111->54117 54118 40ab7c 19 API calls 54113->54118 54115 40da00 54115->53999 54116->53999 54117->54109 54118->54115 56320 41363c SetWindowLongA GetWindowLongA 56321 413699 SetPropA SetPropA 56320->56321 56322 41367b GetWindowLongA 56320->56322 56327 41f39c 56321->56327 56322->56321 56323 41368a SetWindowLongA 56322->56323 56323->56321 56332 415270 56327->56332 56339 423c0c 56327->56339 56433 423a84 56327->56433 56328 4136e9 56333 41527d 56332->56333 56334 4152e3 56333->56334 56335 4152d8 56333->56335 56338 4152e1 56333->56338 56440 424b8c 13 API calls 56334->56440 56335->56338 56441 41505c 46 API calls 56335->56441 56338->56328 56342 423c42 56339->56342 56358 423c63 56342->56358 56442 423b68 56342->56442 56343 423cec 56345 423cf3 56343->56345 56346 423d27 56343->56346 56344 423c8d 56347 423c93 56344->56347 56348 423d50 56344->56348 56353 423cf9 56345->56353 56391 423fb1 56345->56391 56349 423d32 56346->56349 56350 42409a IsIconic 56346->56350 56354 423cc5 56347->56354 56355 423c98 56347->56355 56351 423d62 56348->56351 56352 423d6b 56348->56352 56356 4240d6 56349->56356 56357 423d3b 56349->56357 56350->56358 56362 4240ae GetFocus 56350->56362 56359 423d78 56351->56359 56360 423d69 56351->56360 56449 424194 11 API calls 56352->56449 56363 423f13 SendMessageA 56353->56363 56364 423d07 56353->56364 56354->56358 56382 423cde 56354->56382 56383 423e3f 56354->56383 56365 423df6 56355->56365 56366 423c9e 56355->56366 56463 424850 WinHelpA PostMessageA 56356->56463 56368 4240ed 56357->56368 56392 423cc0 56357->56392 56358->56328 56369 4241dc 11 API calls 56359->56369 56450 423b84 NtdllDefWindowProc_A 56360->56450 56362->56358 56370 4240bf 56362->56370 56363->56358 56364->56358 56364->56392 56413 423f56 56364->56413 56454 423b84 NtdllDefWindowProc_A 56365->56454 56371 423ca7 56366->56371 56372 423e1e PostMessageA 56366->56372 56380 4240f6 56368->56380 56381 42410b 56368->56381 56369->56358 56462 41eff4 GetCurrentThreadId EnumThreadWindows 56370->56462 56377 423cb0 56371->56377 56378 423ea5 56371->56378 56455 423b84 NtdllDefWindowProc_A 56372->56455 56386 423cb9 56377->56386 56387 423dce IsIconic 56377->56387 56388 423eae 56378->56388 56389 423edf 56378->56389 56379 423e39 56379->56358 56390 4244d4 5 API calls 56380->56390 56464 42452c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 56381->56464 56382->56392 56393 423e0b 56382->56393 56446 423b84 NtdllDefWindowProc_A 56383->56446 56385 4240c6 56385->56358 56397 4240ce SetFocus 56385->56397 56386->56392 56398 423d91 56386->56398 56400 423dea 56387->56400 56401 423dde 56387->56401 56457 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 56388->56457 56447 423b84 NtdllDefWindowProc_A 56389->56447 56390->56358 56391->56358 56407 423fd7 IsWindowEnabled 56391->56407 56392->56358 56448 423b84 NtdllDefWindowProc_A 56392->56448 56395 424178 12 API calls 56393->56395 56395->56358 56396 423e45 56404 423e83 56396->56404 56405 423e61 56396->56405 56397->56358 56398->56358 56451 422c4c ShowWindow PostMessageA PostQuitMessage 56398->56451 56453 423b84 NtdllDefWindowProc_A 56400->56453 56452 423bc0 15 API calls 56401->56452 56414 423a84 6 API calls 56404->56414 56456 423b14 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 56405->56456 56406 423eb6 56416 423ec8 56406->56416 56423 41ef58 6 API calls 56406->56423 56407->56358 56417 423fe5 56407->56417 56410 423ee5 56411 423efd 56410->56411 56418 41eea4 2 API calls 56410->56418 56419 423a84 6 API calls 56411->56419 56413->56358 56421 423f78 IsWindowEnabled 56413->56421 56422 423e8b PostMessageA 56414->56422 56458 423b84 NtdllDefWindowProc_A 56416->56458 56426 423fec IsWindowVisible 56417->56426 56418->56411 56419->56358 56420 423e69 PostMessageA 56420->56358 56421->56358 56425 423f86 56421->56425 56422->56358 56423->56416 56459 412310 7 API calls 56425->56459 56426->56358 56428 423ffa GetFocus 56426->56428 56429 4181e0 56428->56429 56430 42400f SetFocus 56429->56430 56460 415240 56430->56460 56434 423b0d 56433->56434 56435 423a94 56433->56435 56434->56328 56435->56434 56436 423a9a EnumWindows 56435->56436 56436->56434 56437 423ab6 GetWindow GetWindowLongA 56436->56437 56465 423a1c GetWindow 56436->56465 56438 423ad5 56437->56438 56438->56434 56439 423b01 SetWindowPos 56438->56439 56439->56434 56439->56438 56440->56338 56441->56338 56443 423b72 56442->56443 56444 423b7d 56442->56444 56443->56444 56445 408720 7 API calls 56443->56445 56444->56343 56444->56344 56445->56444 56446->56396 56447->56410 56448->56358 56449->56358 56450->56358 56451->56358 56452->56358 56453->56358 56454->56358 56455->56379 56456->56420 56457->56406 56458->56358 56459->56358 56461 41525b SetFocus 56460->56461 56461->56358 56462->56385 56463->56379 56464->56379 56466 423a3d GetWindowLongA 56465->56466 56467 423a49 56465->56467 56466->56467 56468 4809f7 56469 480a00 56468->56469 56471 480a2b 56468->56471 56470 480a1d 56469->56470 56469->56471 56840 476c50 189 API calls 56470->56840 56472 480a6a 56471->56472 56842 47f4a4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56471->56842 56473 480a8e 56472->56473 56476 480a81 56472->56476 56477 480a83 56472->56477 56482 480aca 56473->56482 56483 480aac 56473->56483 56486 47f4e8 42 API calls 56476->56486 56844 47f57c 42 API calls 56477->56844 56478 480a22 56478->56471 56841 408be0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 56478->56841 56479 480a5d 56843 47f50c 42 API calls 56479->56843 56847 47f33c 24 API calls 56482->56847 56487 480ac1 56483->56487 56845 47f50c 42 API calls 56483->56845 56486->56473 56846 47f33c 24 API calls 56487->56846 56490 480ac8 56491 480ada 56490->56491 56492 480ae0 56490->56492 56493 480ade 56491->56493 56497 47f4e8 42 API calls 56491->56497 56492->56493 56495 47f4e8 42 API calls 56492->56495 56594 47c66c 56493->56594 56495->56493 56497->56493 56595 42d898 GetWindowsDirectoryA 56594->56595 56596 47c690 56595->56596 56597 403450 4 API calls 56596->56597 56598 47c69d 56597->56598 56599 42d8c4 GetSystemDirectoryA 56598->56599 56600 47c6a5 56599->56600 56601 403450 4 API calls 56600->56601 56602 47c6b2 56601->56602 56603 42d8f0 6 API calls 56602->56603 56604 47c6ba 56603->56604 56605 403450 4 API calls 56604->56605 56606 47c6c7 56605->56606 56607 47c6d0 56606->56607 56608 47c6ec 56606->56608 56879 42d208 56607->56879 56610 403400 4 API calls 56608->56610 56612 47c6ea 56610->56612 56614 47c731 56612->56614 56616 42c8cc 5 API calls 56612->56616 56613 403450 4 API calls 56613->56612 56859 47c4f4 56614->56859 56618 47c70c 56616->56618 56620 403450 4 API calls 56618->56620 56619 403450 4 API calls 56621 47c74d 56619->56621 56622 47c719 56620->56622 56623 47c76b 56621->56623 56624 4035c0 4 API calls 56621->56624 56622->56614 56626 403450 4 API calls 56622->56626 56625 47c4f4 8 API calls 56623->56625 56624->56623 56627 47c77a 56625->56627 56626->56614 56628 403450 4 API calls 56627->56628 56629 47c787 56628->56629 56630 47c7af 56629->56630 56632 42c3fc 5 API calls 56629->56632 56631 47c816 56630->56631 56633 47c4f4 8 API calls 56630->56633 56635 47c8de 56631->56635 56636 47c836 SHGetKnownFolderPath 56631->56636 56634 47c79d 56632->56634 56637 47c7c7 56633->56637 56640 4035c0 4 API calls 56634->56640 56640->56630 56840->56478 56842->56479 56843->56472 56844->56473 56845->56487 56846->56490 56847->56490 56860 42de1c RegOpenKeyExA 56859->56860 56861 47c51a 56860->56861 56862 47c540 56861->56862 56863 47c51e 56861->56863 56864 403400 4 API calls 56862->56864 56865 42dd4c 6 API calls 56863->56865 56866 47c547 56864->56866 56867 47c52a 56865->56867 56866->56619 56868 47c535 RegCloseKey 56867->56868 56869 403400 4 API calls 56867->56869 56868->56866 56869->56868 56880 4038a4 4 API calls 56879->56880 56881 42d21b 56880->56881 56882 42d232 GetEnvironmentVariableA 56881->56882 56886 42d245 56881->56886 56891 42dbd0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 56881->56891 56882->56881 56883 42d23e 56882->56883 56885 403400 4 API calls 56883->56885 56885->56886 56886->56613 56891->56881
                                                                                    Strings
                                                                                    • Existing file's SHA-1 hash is different from our file. Proceeding., xrefs: 00470CC4
                                                                                    • InUn, xrefs: 0047115F
                                                                                    • Same version. Skipping., xrefs: 00470CE5
                                                                                    • Same time stamp. Skipping., xrefs: 00470D55
                                                                                    • Non-default bitness: 64-bit, xrefs: 004708AF
                                                                                    • Existing file has a later time stamp. Skipping., xrefs: 00470DCF
                                                                                    • Existing file is protected by Windows File Protection. Skipping., xrefs: 00470DEC
                                                                                    • Installing the file., xrefs: 00470F09
                                                                                    • Time stamp of existing file: (failed to read), xrefs: 00470A37
                                                                                    • Skipping due to "onlyifdoesntexist" flag., xrefs: 004709CE
                                                                                    • Version of existing file: %u.%u.%u.%u, xrefs: 00470B7C
                                                                                    • Will register the file (a DLL/OCX) later., xrefs: 0047151F
                                                                                    • Time stamp of our file: %s, xrefs: 0047099B
                                                                                    • Existing file's SHA-1 hash matches our file. Skipping., xrefs: 00470CB5
                                                                                    • Dest file exists., xrefs: 004709BB
                                                                                    • Failed to strip read-only attribute., xrefs: 00470ED3
                                                                                    • Time stamp of our file: (failed to read), xrefs: 004709A7
                                                                                    • User opted not to strip the existing file's read-only attribute. Skipping., xrefs: 00470E96
                                                                                    • Time stamp of existing file: %s, xrefs: 00470A2B
                                                                                    • Version of our file: (none), xrefs: 00470AFC
                                                                                    • Couldn't read time stamp. Skipping., xrefs: 00470D35
                                                                                    • Installing into GAC, xrefs: 00471714
                                                                                    • User opted not to overwrite the existing file. Skipping., xrefs: 00470E4D
                                                                                    • Skipping due to "onlyifdestfileexists" flag., xrefs: 00470EFA
                                                                                    • Incrementing shared file count (32-bit)., xrefs: 004715A5
                                                                                    • Will register the file (a type library) later., xrefs: 00471513
                                                                                    • Non-default bitness: 32-bit, xrefs: 004708BB
                                                                                    • Failed to read existing file's SHA-1 hash. Proceeding., xrefs: 00470CD0
                                                                                    • Version of our file: %u.%u.%u.%u, xrefs: 00470AF0
                                                                                    • Dest file is protected by Windows File Protection., xrefs: 004708ED
                                                                                    • Stripped read-only attribute., xrefs: 00470EC7
                                                                                    • Dest filename: %s, xrefs: 00470894
                                                                                    • , xrefs: 00470BCF, 00470DA0, 00470E1E
                                                                                    • Incrementing shared file count (64-bit)., xrefs: 0047158C
                                                                                    • -- File entry --, xrefs: 004706FB
                                                                                    • Existing file is a newer version. Skipping., xrefs: 00470C02
                                                                                    • Version of existing file: (none), xrefs: 00470CFA
                                                                                    • Uninstaller requires administrator: %s, xrefs: 0047118F
                                                                                    • @, xrefs: 004707B0
                                                                                    • .tmp, xrefs: 00470FB7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $-- File entry --$.tmp$@$Couldn't read time stamp. Skipping.$Dest file exists.$Dest file is protected by Windows File Protection.$Dest filename: %s$Existing file has a later time stamp. Skipping.$Existing file is a newer version. Skipping.$Existing file is protected by Windows File Protection. Skipping.$Existing file's SHA-1 hash is different from our file. Proceeding.$Existing file's SHA-1 hash matches our file. Skipping.$Failed to read existing file's SHA-1 hash. Proceeding.$Failed to strip read-only attribute.$InUn$Incrementing shared file count (32-bit).$Incrementing shared file count (64-bit).$Installing into GAC$Installing the file.$Non-default bitness: 32-bit$Non-default bitness: 64-bit$Same time stamp. Skipping.$Same version. Skipping.$Skipping due to "onlyifdestfileexists" flag.$Skipping due to "onlyifdoesntexist" flag.$Stripped read-only attribute.$Time stamp of existing file: %s$Time stamp of existing file: (failed to read)$Time stamp of our file: %s$Time stamp of our file: (failed to read)$Uninstaller requires administrator: %s$User opted not to overwrite the existing file. Skipping.$User opted not to strip the existing file's read-only attribute. Skipping.$Version of existing file: %u.%u.%u.%u$Version of existing file: (none)$Version of our file: %u.%u.%u.%u$Version of our file: (none)$Will register the file (a DLL/OCX) later.$Will register the file (a type library) later.
                                                                                    • API String ID: 0-4021121268
                                                                                    • Opcode ID: cebd1a573a13cfb1480ab73f2a07467b13e4d984594641078933206a2f2f5451
                                                                                    • Instruction ID: 04e5041402f80353ef90c659d92e8d378e84d4fed116f8838aecbbc27e5febe3
                                                                                    • Opcode Fuzzy Hash: cebd1a573a13cfb1480ab73f2a07467b13e4d984594641078933206a2f2f5451
                                                                                    • Instruction Fuzzy Hash: 31927574A0424CDFDB21DFA9C445BDDBBB5AF05304F1480ABE848A7392D7789E49CB19

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1578 42e09c-42e0ad 1579 42e0b8-42e0dd AllocateAndInitializeSid 1578->1579 1580 42e0af-42e0b3 1578->1580 1581 42e287-42e28f 1579->1581 1582 42e0e3-42e100 GetVersion 1579->1582 1580->1581 1583 42e102-42e117 GetModuleHandleA GetProcAddress 1582->1583 1584 42e119-42e11b 1582->1584 1583->1584 1585 42e142-42e15c GetCurrentThread OpenThreadToken 1584->1585 1586 42e11d-42e12b CheckTokenMembership 1584->1586 1589 42e193-42e1bb GetTokenInformation 1585->1589 1590 42e15e-42e168 GetLastError 1585->1590 1587 42e131-42e13d 1586->1587 1588 42e269-42e27f FreeSid 1586->1588 1587->1588 1591 42e1d6-42e1fa call 402648 GetTokenInformation 1589->1591 1592 42e1bd-42e1c5 GetLastError 1589->1592 1593 42e174-42e187 GetCurrentProcess OpenProcessToken 1590->1593 1594 42e16a-42e16f call 4031bc 1590->1594 1605 42e208-42e210 1591->1605 1606 42e1fc-42e206 call 4031bc * 2 1591->1606 1592->1591 1595 42e1c7-42e1d1 call 4031bc * 2 1592->1595 1593->1589 1598 42e189-42e18e call 4031bc 1593->1598 1594->1581 1595->1581 1598->1581 1607 42e212-42e213 1605->1607 1608 42e243-42e261 call 402660 CloseHandle 1605->1608 1606->1581 1611 42e215-42e228 EqualSid 1607->1611 1615 42e22a-42e237 1611->1615 1616 42e23f-42e241 1611->1616 1615->1616 1619 42e239-42e23d 1615->1619 1616->1608 1616->1611 1619->1608
                                                                                    APIs
                                                                                    • AllocateAndInitializeSid.ADVAPI32(00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0D6
                                                                                    • GetVersion.KERNEL32(00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E0F3
                                                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E10C
                                                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042E112
                                                                                    • CheckTokenMembership.KERNELBASE(00000000,00000000,?,00000000,0042E280,?,00499788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E127
                                                                                    • FreeSid.ADVAPI32(00000000,0042E287,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E27A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressAllocateCheckFreeHandleInitializeMembershipModuleProcTokenVersion
                                                                                    • String ID: CheckTokenMembership$advapi32.dll
                                                                                    • API String ID: 2252812187-1888249752
                                                                                    • Opcode ID: a9f409996ddfe82e0213da269ff1de212d34eb3ec341ac20085b7d7d2472ef68
                                                                                    • Instruction ID: e5677345bf142a8b1d9111380f95962c8bb8cf61ba8e960ca5c3fd0f127139eb
                                                                                    • Opcode Fuzzy Hash: a9f409996ddfe82e0213da269ff1de212d34eb3ec341ac20085b7d7d2472ef68
                                                                                    • Instruction Fuzzy Hash: E351A271B44215EEEB10EAE69C42BBF77ACEB09704F9404BBB901F7281D57C99018B79

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1642 4502c0-4502cd 1643 4502d3-4502e0 GetVersion 1642->1643 1644 45037c-450386 1642->1644 1643->1644 1645 4502e6-4502fc LoadLibraryA 1643->1645 1645->1644 1646 4502fe-450377 GetProcAddress * 6 1645->1646 1646->1644
                                                                                    APIs
                                                                                    • GetVersion.KERNEL32(00480B52), ref: 004502D3
                                                                                    • LoadLibraryA.KERNEL32(Rstrtmgr.dll,00480B52), ref: 004502EB
                                                                                    • GetProcAddress.KERNEL32(6E570000,RmStartSession), ref: 00450309
                                                                                    • GetProcAddress.KERNEL32(6E570000,RmRegisterResources), ref: 0045031E
                                                                                    • GetProcAddress.KERNEL32(6E570000,RmGetList), ref: 00450333
                                                                                    • GetProcAddress.KERNEL32(6E570000,RmShutdown), ref: 00450348
                                                                                    • GetProcAddress.KERNEL32(6E570000,RmRestart), ref: 0045035D
                                                                                    • GetProcAddress.KERNEL32(6E570000,RmEndSession), ref: 00450372
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$LibraryLoadVersion
                                                                                    • String ID: RmEndSession$RmGetList$RmRegisterResources$RmRestart$RmShutdown$RmStartSession$Rstrtmgr.dll
                                                                                    • API String ID: 1968650500-3419246398
                                                                                    • Opcode ID: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                                                                                    • Instruction ID: c77cef2ad5653e61b65a4477cbb73d0d56cf7b8a9d174f96be3e9b6947252677
                                                                                    • Opcode Fuzzy Hash: 2681632e5309952c30eea3f8c2bf2722b4339596373eceda0d07b93e3cd0d7e4
                                                                                    • Instruction Fuzzy Hash: B211F7B4510301DBD710FB61BF45A2E36E9E728315B08063FE804961A2CB7C4844CF8C

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1790 423c0c-423c40 1791 423c42-423c43 1790->1791 1792 423c74-423c8b call 423b68 1790->1792 1793 423c45-423c61 call 40b24c 1791->1793 1798 423cec-423cf1 1792->1798 1799 423c8d 1792->1799 1819 423c63-423c6b 1793->1819 1820 423c70-423c72 1793->1820 1800 423cf3 1798->1800 1801 423d27-423d2c 1798->1801 1802 423c93-423c96 1799->1802 1803 423d50-423d60 1799->1803 1809 423fb1-423fb9 1800->1809 1810 423cf9-423d01 1800->1810 1804 423d32-423d35 1801->1804 1805 42409a-4240a8 IsIconic 1801->1805 1811 423cc5-423cc8 1802->1811 1812 423c98 1802->1812 1807 423d62-423d67 1803->1807 1808 423d6b-423d73 call 424194 1803->1808 1813 4240d6-4240eb call 424850 1804->1813 1814 423d3b-423d3c 1804->1814 1815 424152-42415a 1805->1815 1824 4240ae-4240b9 GetFocus 1805->1824 1821 423d78-423d80 call 4241dc 1807->1821 1822 423d69-423d8c call 423b84 1807->1822 1808->1815 1809->1815 1816 423fbf-423fca call 4181e0 1809->1816 1825 423f13-423f3a SendMessageA 1810->1825 1826 423d07-423d0c 1810->1826 1817 423da9-423db0 1811->1817 1818 423cce-423ccf 1811->1818 1827 423df6-423e06 call 423b84 1812->1827 1828 423c9e-423ca1 1812->1828 1813->1815 1831 423d42-423d45 1814->1831 1832 4240ed-4240f4 1814->1832 1829 424171-424177 1815->1829 1816->1815 1878 423fd0-423fdf call 4181e0 IsWindowEnabled 1816->1878 1817->1815 1841 423db6-423dbd 1817->1841 1842 423cd5-423cd8 1818->1842 1843 423f3f-423f46 1818->1843 1819->1829 1820->1792 1820->1793 1821->1815 1822->1815 1824->1815 1836 4240bf-4240c8 call 41eff4 1824->1836 1825->1815 1844 423d12-423d13 1826->1844 1845 42404a-424055 1826->1845 1827->1815 1837 423ca7-423caa 1828->1837 1838 423e1e-423e3a PostMessageA call 423b84 1828->1838 1847 424120-424127 1831->1847 1848 423d4b 1831->1848 1858 4240f6-424109 call 4244d4 1832->1858 1859 42410b-42411e call 42452c 1832->1859 1836->1815 1891 4240ce-4240d4 SetFocus 1836->1891 1855 423cb0-423cb3 1837->1855 1856 423ea5-423eac 1837->1856 1838->1815 1841->1815 1861 423dc3-423dc9 1841->1861 1862 423cde-423ce1 1842->1862 1863 423e3f-423e5f call 423b84 1842->1863 1843->1815 1851 423f4c-423f51 call 404e54 1843->1851 1864 424072-42407d 1844->1864 1865 423d19-423d1c 1844->1865 1845->1815 1849 42405b-42406d 1845->1849 1882 42413a-424149 1847->1882 1883 424129-424138 1847->1883 1866 42414b-42414c call 423b84 1848->1866 1849->1815 1851->1815 1873 423cb9-423cba 1855->1873 1874 423dce-423ddc IsIconic 1855->1874 1875 423eae-423ec1 call 423b14 1856->1875 1876 423edf-423ef0 call 423b84 1856->1876 1858->1815 1859->1815 1861->1815 1879 423ce7 1862->1879 1880 423e0b-423e19 call 424178 1862->1880 1906 423e83-423ea0 call 423a84 PostMessageA 1863->1906 1907 423e61-423e7e call 423b14 PostMessageA 1863->1907 1864->1815 1867 424083-424095 1864->1867 1884 423d22 1865->1884 1885 423f56-423f5e 1865->1885 1903 424151 1866->1903 1867->1815 1892 423cc0 1873->1892 1893 423d91-423d99 1873->1893 1899 423dea-423df1 call 423b84 1874->1899 1900 423dde-423de5 call 423bc0 1874->1900 1922 423ed3-423eda call 423b84 1875->1922 1923 423ec3-423ecd call 41ef58 1875->1923 1916 423ef2-423ef8 call 41eea4 1876->1916 1917 423f06-423f0e call 423a84 1876->1917 1878->1815 1924 423fe5-423ff4 call 4181e0 IsWindowVisible 1878->1924 1879->1866 1880->1815 1882->1815 1883->1815 1884->1866 1885->1815 1890 423f64-423f6b 1885->1890 1890->1815 1908 423f71-423f80 call 4181e0 IsWindowEnabled 1890->1908 1891->1815 1892->1866 1893->1815 1909 423d9f-423da4 call 422c4c 1893->1909 1899->1815 1900->1815 1903->1815 1906->1815 1907->1815 1908->1815 1937 423f86-423f9c call 412310 1908->1937 1909->1815 1935 423efd-423f00 1916->1935 1917->1815 1922->1815 1923->1922 1924->1815 1942 423ffa-424045 GetFocus call 4181e0 SetFocus call 415240 SetFocus 1924->1942 1935->1917 1937->1815 1946 423fa2-423fac 1937->1946 1942->1815 1946->1815
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 22958418fcb5307417e2cb8c5b21c835fdc4d5c2778e3f26f52eb9817f6a2da5
                                                                                    • Instruction ID: afb4f91cf4018cf9acc1c9974f14325182323c15c0e0405bd0f9b005e596376e
                                                                                    • Opcode Fuzzy Hash: 22958418fcb5307417e2cb8c5b21c835fdc4d5c2778e3f26f52eb9817f6a2da5
                                                                                    • Instruction Fuzzy Hash: 03E1AE31700124EFDB04DF69E989AADB7B5FB54300FA440AAE5559B352C73CEE81DB09

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2133 4673a4-4673ba 2134 4673c4-46747b call 49577c call 402b30 * 6 2133->2134 2135 4673bc-4673bf call 402d30 2133->2135 2152 46747d-4674a4 call 41463c 2134->2152 2153 4674b8-4674d1 2134->2153 2135->2134 2157 4674a6 2152->2157 2158 4674a9-4674b3 call 4145fc 2152->2158 2159 4674d3-4674fa call 41461c 2153->2159 2160 46750e-46751c call 495a84 2153->2160 2157->2158 2158->2153 2166 4674ff-467509 call 4145dc 2159->2166 2167 4674fc 2159->2167 2168 46751e-46752d call 4958cc 2160->2168 2169 46752f-467531 call 4959f0 2160->2169 2166->2160 2167->2166 2174 467536-467589 call 4953e0 call 41a3d0 * 2 2168->2174 2169->2174 2181 46759a-4675af call 451458 call 414b18 2174->2181 2182 46758b-467598 call 414b18 2174->2182 2187 4675b4-4675bb 2181->2187 2182->2187 2189 467603-467a89 call 49581c call 495b40 call 41461c * 3 call 4146bc call 4145dc * 3 call 460bfc call 460c14 call 460c20 call 460c68 call 460bfc call 460c14 call 460c20 call 460c68 call 460c14 call 460c68 LoadBitmapA call 41d6b0 call 460c38 call 460c50 call 467180 call 468c94 call 466800 call 40357c call 414b18 call 466b38 call 466b40 call 466800 call 40357c * 2 call 414b18 call 468c94 call 466800 call 414b18 call 466b38 call 466b40 call 414b18 * 2 call 468c94 call 414b18 * 2 call 466b38 call 4145fc call 466b38 call 4145fc call 468c94 call 414b18 call 466b38 call 466b40 call 468c94 call 414b18 call 466b38 call 4145fc * 2 call 414b18 call 466b38 call 4145fc 2187->2189 2190 4675bd-4675fe call 4146bc call 414700 call 420f98 call 420fc4 call 420b68 call 420b94 2187->2190 2320 467ae5-467afe call 414a44 * 2 2189->2320 2321 467a8b-467ae3 call 4145fc call 414b18 call 466b38 call 4145fc 2189->2321 2190->2189 2329 467b03-467bb4 call 466800 call 468c94 call 466800 call 414b18 call 495b40 call 466b38 2320->2329 2321->2329 2347 467bb6-467bd1 2329->2347 2348 467bee-467e24 call 466800 call 414b18 call 495b50 * 2 call 42e8c0 call 4145fc call 466b38 call 4145fc call 4181e0 call 42ed38 call 414b18 call 49581c call 495b40 call 41461c call 466800 call 414b18 call 466b38 call 4145fc call 466800 call 468c94 call 466800 call 414b18 call 466b38 call 4145fc call 466b40 call 466800 call 414b18 call 466b38 2329->2348 2349 467bd6-467be9 call 4145fc 2347->2349 2350 467bd3 2347->2350 2409 467e26-467e2f 2348->2409 2410 467e65-467f1e call 466800 call 468c94 call 466800 call 414b18 call 495b40 call 466b38 2348->2410 2349->2348 2350->2349 2409->2410 2411 467e31-467e60 call 414a44 call 466b40 2409->2411 2428 467f20-467f3b 2410->2428 2429 467f58-468379 call 466800 call 414b18 call 495b50 * 2 call 42e8c0 call 4145fc call 466b38 call 4145fc call 414b18 call 49581c call 495b40 call 41461c call 414b18 call 466800 call 468c94 call 466800 call 414b18 call 466b38 call 466b40 call 42bbd0 call 495b50 call 44e8b0 call 466800 call 468c94 call 466800 call 468c94 call 466800 call 468c94 * 2 call 414b18 call 466b38 call 466b40 call 468c94 call 4953e0 call 41a3d0 call 466800 call 40357c call 414b18 call 466b38 call 4145fc call 414b18 * 2 call 495b50 call 403494 call 40357c * 2 call 414b18 2410->2429 2411->2410 2431 467f40-467f53 call 4145fc 2428->2431 2432 467f3d 2428->2432 2528 46839d-4683a4 2429->2528 2529 46837b-468398 call 44ffdc call 450138 2429->2529 2431->2429 2432->2431 2531 4683a6-4683c3 call 44ffdc call 450138 2528->2531 2532 4683c8-4683cf 2528->2532 2529->2528 2531->2532 2535 4683f3-468439 call 4181e0 GetSystemMenu AppendMenuA call 403738 AppendMenuA call 468d88 2532->2535 2536 4683d1-4683ee call 44ffdc call 450138 2532->2536 2549 468453 2535->2549 2550 46843b-468442 2535->2550 2536->2535 2553 468455-468464 2549->2553 2551 468444-46844d 2550->2551 2552 46844f-468451 2550->2552 2551->2549 2551->2552 2552->2553 2554 468466-46846d 2553->2554 2555 46847e 2553->2555 2557 46846f-468478 2554->2557 2558 46847a-46847c 2554->2558 2556 468480-46849a 2555->2556 2559 468543-46854a 2556->2559 2560 4684a0-4684a9 2556->2560 2557->2555 2557->2558 2558->2556 2563 468550-468573 call 47c26c call 403450 2559->2563 2564 4685dd-4685eb call 414b18 2559->2564 2561 468504-46853e call 414b18 * 3 2560->2561 2562 4684ab-468502 call 47c26c call 414b18 call 47c26c call 414b18 call 47c26c call 414b18 2560->2562 2561->2559 2562->2559 2587 468584-468598 call 403494 2563->2587 2588 468575-468582 call 47c440 2563->2588 2572 4685f0-4685f9 2564->2572 2576 4685ff-468617 call 429fd8 2572->2576 2577 468709-468738 call 42b96c call 44e83c 2572->2577 2589 46868e-468692 2576->2589 2590 468619-46861d 2576->2590 2606 4687e6-4687ea 2577->2606 2607 46873e-468742 2577->2607 2602 4685aa-4685db call 42c804 call 42cbc0 call 403494 call 414b18 2587->2602 2603 46859a-4685a5 call 403494 2587->2603 2588->2602 2596 468694-46869d 2589->2596 2597 4686e2-4686e6 2589->2597 2598 46861f-468659 call 40b24c call 47c26c 2590->2598 2596->2597 2604 46869f-4686aa 2596->2604 2609 4686fa-468704 call 42a05c 2597->2609 2610 4686e8-4686f8 call 42a05c 2597->2610 2663 46865b-468662 2598->2663 2664 468688-46868c 2598->2664 2602->2572 2603->2602 2604->2597 2614 4686ac-4686b0 2604->2614 2617 4687ec-4687f3 2606->2617 2618 468869-46886d 2606->2618 2616 468744-468756 call 40b24c 2607->2616 2609->2577 2610->2577 2622 4686b2-4686d5 call 40b24c call 406ac4 2614->2622 2641 468788-4687bf call 47c26c call 44cb0c 2616->2641 2642 468758-468786 call 47c26c call 44cbdc 2616->2642 2617->2618 2625 4687f5-4687fc 2617->2625 2626 4688d6-4688df 2618->2626 2627 46886f-468886 call 40b24c 2618->2627 2673 4686d7-4686da 2622->2673 2674 4686dc-4686e0 2622->2674 2625->2618 2636 4687fe-468809 2625->2636 2634 4688e1-4688f9 call 40b24c call 4699fc 2626->2634 2635 4688fe-468913 call 466ee0 call 466c5c 2626->2635 2656 4688c6-4688d4 call 4699fc 2627->2656 2657 468888-4688c4 call 40b24c call 4699fc * 2 call 46989c 2627->2657 2634->2635 2682 468965-46896f call 414a44 2635->2682 2683 468915-468938 call 42a040 call 40b24c 2635->2683 2636->2635 2644 46880f-468813 2636->2644 2684 4687c4-4687c8 2641->2684 2642->2684 2655 468815-46882b call 40b24c 2644->2655 2679 46885e-468862 2655->2679 2680 46882d-468859 call 42a05c call 4699fc call 46989c 2655->2680 2656->2635 2657->2635 2663->2664 2675 468664-468676 call 406ac4 2663->2675 2664->2589 2664->2598 2673->2597 2674->2597 2674->2622 2675->2664 2701 468678-468682 2675->2701 2679->2655 2694 468864 2679->2694 2680->2635 2696 468974-468993 call 414a44 2682->2696 2715 468943-468952 call 414a44 2683->2715 2716 46893a-468941 2683->2716 2692 4687d3-4687d5 2684->2692 2693 4687ca-4687d1 2684->2693 2700 4687dc-4687e0 2692->2700 2693->2692 2693->2700 2694->2635 2711 468995-4689b8 call 42a040 call 469b5c 2696->2711 2712 4689bd-4689e0 call 47c26c call 403450 2696->2712 2700->2606 2700->2616 2701->2664 2706 468684 2701->2706 2706->2664 2711->2712 2730 4689e2-4689eb 2712->2730 2731 4689fc-468a05 2712->2731 2715->2696 2716->2715 2720 468954-468963 call 414a44 2716->2720 2720->2696 2730->2731 2734 4689ed-4689fa call 47c440 2730->2734 2732 468a07-468a19 call 403684 2731->2732 2733 468a1b-468a2b call 403494 2731->2733 2732->2733 2742 468a2d-468a38 call 403494 2732->2742 2741 468a3d-468a54 call 414b18 2733->2741 2734->2741 2746 468a56-468a5d 2741->2746 2747 468a8a-468a94 call 414a44 2741->2747 2742->2741 2749 468a5f-468a68 2746->2749 2750 468a6a-468a74 call 42b0e4 2746->2750 2752 468a99-468abe call 403400 * 3 2747->2752 2749->2750 2753 468a79-468a88 call 414a44 2749->2753 2750->2753 2753->2752
                                                                                    APIs
                                                                                      • Part of subcall function 004958CC: GetWindowRect.USER32(00000000), ref: 004958E2
                                                                                    • LoadBitmapA.USER32(00400000,STOPIMAGE), ref: 00467773
                                                                                      • Part of subcall function 0041D6B0: GetObjectA.GDI32(?,00000018,0046778D), ref: 0041D6DB
                                                                                      • Part of subcall function 00467180: SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                                                                                      • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                                                                                      • Part of subcall function 00467180: ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                                                                                      • Part of subcall function 00466B40: KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                                                                                      • Part of subcall function 00495B50: MulDiv.KERNEL32(0000000D,?,0000000D), ref: 00495B5A
                                                                                      • Part of subcall function 0042ED38: GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                                                                                      • Part of subcall function 0042ED38: SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                                                                                      • Part of subcall function 0049581C: GetDC.USER32(00000000), ref: 0049583E
                                                                                      • Part of subcall function 0049581C: SelectObject.GDI32(?,00000000), ref: 00495864
                                                                                      • Part of subcall function 0049581C: ReleaseDC.USER32(00000000,?), ref: 004958B5
                                                                                      • Part of subcall function 00495B40: MulDiv.KERNEL32(0000004B,?,00000006), ref: 00495B4A
                                                                                    • GetSystemMenu.USER32(00000000,00000000,0000000C,00000000,00000000,00000000,00000000,021AFC68,021B1960,?,?,021B1990,?,?,021B19E0,?), ref: 004683FD
                                                                                    • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 0046840E
                                                                                    • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00468426
                                                                                      • Part of subcall function 0042A05C: SendMessageA.USER32(00000000,0000014E,00000000,00000000), ref: 0042A072
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$AppendExtractIconObject$AddressAutoBitmapCallbackCompleteDispatcherFileInfoLoadMessageProcRectReleaseSelectSendSystemUserWindow
                                                                                    • String ID: $(Default)$STOPIMAGE$%H
                                                                                    • API String ID: 3231140908-2624782221
                                                                                    • Opcode ID: cd61aa661d0cbe35304877807cea77ca0702e96d718fc27b010991c92e86a780
                                                                                    • Instruction ID: 1a3196d4b4984e68f3522cc8585b165e0004af585c118fa25862355e2bbb38c0
                                                                                    • Opcode Fuzzy Hash: cd61aa661d0cbe35304877807cea77ca0702e96d718fc27b010991c92e86a780
                                                                                    • Instruction Fuzzy Hash: 95F2C6346005248FCB00EF69D9D9F9973F1BF49304F1582BAE5049B36ADB74AC46CB9A
                                                                                    APIs
                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 00474FE1
                                                                                    • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750BE
                                                                                    • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,004750F2,?,?,0049C1E0,00000000), ref: 004750CC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$CloseFirstNext
                                                                                    • String ID: unins$unins???.*
                                                                                    • API String ID: 3541575487-1009660736
                                                                                    • Opcode ID: 490a2bf6f62b777b12f8bb075fd261ec892e44da2a65e6c72c5e66397d3a6b60
                                                                                    • Instruction ID: 191fa049ef1442540897bd6b232d6b1da598bf4afdbbee48782243349675ce5a
                                                                                    • Opcode Fuzzy Hash: 490a2bf6f62b777b12f8bb075fd261ec892e44da2a65e6c72c5e66397d3a6b60
                                                                                    • Instruction Fuzzy Hash: 95315074A00548ABCB10EB65CD81BDEB7A9DF45304F50C0B6E40CAB3A2DB789F418B59
                                                                                    APIs
                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452A9D
                                                                                    • GetLastError.KERNEL32(00000000,?,00000000,00452AC3,?,?,-00000001,00000000), ref: 00452AA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileFindFirstLast
                                                                                    • String ID:
                                                                                    • API String ID: 873889042-0
                                                                                    • Opcode ID: 9c675a8f1f28b386d0fa8c71b8ecb41695e84785a8bb79b0d9bc0322d07a8b6a
                                                                                    • Instruction ID: 3e58272229af866f17ac5928e9872a720c3be2d4903e778e839a846eb7d55d53
                                                                                    • Opcode Fuzzy Hash: 9c675a8f1f28b386d0fa8c71b8ecb41695e84785a8bb79b0d9bc0322d07a8b6a
                                                                                    • Instruction Fuzzy Hash: 94F0F971A04604AB8B10EF669D4149EF7ACEB8672571046BBFC14E3282DAB84E0485A8
                                                                                    APIs
                                                                                    • GetVersion.KERNEL32(?,0046E17A), ref: 0046E0EE
                                                                                    • CoCreateInstance.OLE32(00499B98,00000000,00000001,00499BA8,?,?,0046E17A), ref: 0046E10A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateInstanceVersion
                                                                                    • String ID:
                                                                                    • API String ID: 1462612201-0
                                                                                    • Opcode ID: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
                                                                                    • Instruction ID: e32462cabb755f907f5de1887460af807d545ab7c9798ff14e002636b2035e3f
                                                                                    • Opcode Fuzzy Hash: 323ef6e325584454da74969db5385277b15969f7569c16a340aaa36caeb4eadb
                                                                                    • Instruction Fuzzy Hash: 90F0A7352812009FEB10975ADC86B8937C47B22315F50007BE04497292D2BD94C0471F
                                                                                    APIs
                                                                                    • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 2299586839-0
                                                                                    • Opcode ID: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                                                                                    • Instruction ID: 8daab3ef8e56b0da8b8c23f45c5b5388ad46b50bd825570c2d348c61856efc62
                                                                                    • Opcode Fuzzy Hash: 64da881718ef9bfb5c3691e8182369eeaf442f2681d4624e7b5adc518b999176
                                                                                    • Instruction Fuzzy Hash: BFE0223170021466C311AA2A9C86AEAB34C9758310F00427FB904E73C2EDB89E4042A8
                                                                                    APIs
                                                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?,?,00424151,?,00000000,0042415C), ref: 00423BAE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: NtdllProc_Window
                                                                                    • String ID:
                                                                                    • API String ID: 4255912815-0
                                                                                    • Opcode ID: 03c86555d74cd6010afd77b9e61a524e96c156e733cd5bd8e2feacc4387cef90
                                                                                    • Instruction ID: a748582893d7571d6ac8bdbe819d0a8fbf5f36db2d3505b6f19a51c7a0bbae16
                                                                                    • Opcode Fuzzy Hash: 03c86555d74cd6010afd77b9e61a524e96c156e733cd5bd8e2feacc4387cef90
                                                                                    • Instruction Fuzzy Hash: 47F0B979205608AF8B40DF99C588D4ABBE8AB4C260B058195B988CB321C234ED808F90
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: NameUser
                                                                                    • String ID:
                                                                                    • API String ID: 2645101109-0
                                                                                    • Opcode ID: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                                                                                    • Instruction ID: 9f318ec9847dd9a6abcb639c8bc611599857aea0b867fcad4bfaeec6bdb042bf
                                                                                    • Opcode Fuzzy Hash: 969018677e36c7ee3cac7a31a88a81c68082f6a067fe28717e4d5eb0c099a74a
                                                                                    • Instruction Fuzzy Hash: 8FD0C27230470473CB00AA689C825AA35CD8B84305F00483E3CC5DA2C3FABDDA485756
                                                                                    APIs
                                                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F53C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: NtdllProc_Window
                                                                                    • String ID:
                                                                                    • API String ID: 4255912815-0
                                                                                    • Opcode ID: 9e43cbcd657a147b44e82c26281af1c584f356d37a2e763e4ec43db1fd6d4cd6
                                                                                    • Instruction ID: 7ca9c19e24a5def9c493c34941f9da96f9ca037215ec7a65a90973bf7a04e639
                                                                                    • Opcode Fuzzy Hash: 9e43cbcd657a147b44e82c26281af1c584f356d37a2e763e4ec43db1fd6d4cd6
                                                                                    • Instruction Fuzzy Hash: FCD09E7120011D7B9B00DE99E840D6B33AD9B88710B909925F945D7642D634ED9197A5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 844 46f058-46f08a 845 46f0a7 844->845 846 46f08c-46f093 844->846 849 46f0ae-46f0e6 call 403634 call 403738 call 42dec0 845->849 847 46f095-46f09c 846->847 848 46f09e-46f0a5 846->848 847->845 847->848 848->849 856 46f101-46f12a call 403738 call 42dde4 849->856 857 46f0e8-46f0fc call 403738 call 42dec0 849->857 865 46f12c-46f135 call 46ed28 856->865 866 46f13a-46f163 call 46ee44 856->866 857->856 865->866 870 46f175-46f178 call 403400 866->870 871 46f165-46f173 call 403494 866->871 875 46f17d-46f1c8 call 46ee44 call 42c3fc call 46ee8c call 46ee44 870->875 871->875 884 46f1de-46f1ff call 45559c call 46ee44 875->884 885 46f1ca-46f1dd call 46eeb4 875->885 892 46f255-46f25c 884->892 893 46f201-46f254 call 46ee44 call 431404 call 46ee44 call 431404 call 46ee44 884->893 885->884 894 46f25e-46f29b call 431404 call 46ee44 call 431404 call 46ee44 892->894 895 46f29c-46f2a3 892->895 893->892 894->895 899 46f2e4-46f309 call 40b24c call 46ee44 895->899 900 46f2a5-46f2e3 call 46ee44 * 3 895->900 919 46f30b-46f316 call 47c26c 899->919 920 46f318-46f321 call 403494 899->920 900->899 929 46f326-46f331 call 478e04 919->929 920->929 934 46f333-46f338 929->934 935 46f33a 929->935 936 46f33f-46f509 call 403778 call 46ee44 call 47c26c call 46ee8c call 403494 call 40357c * 2 call 46ee44 call 403494 call 40357c * 2 call 46ee44 call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c call 46ee8c call 47c26c 934->936 935->936 999 46f51f-46f52d call 46eeb4 936->999 1000 46f50b-46f51d call 46ee44 936->1000 1004 46f532 999->1004 1005 46f533-46f57c call 46eeb4 call 46eee8 call 46ee44 call 47c26c call 46ef4c 1000->1005 1004->1005 1016 46f5a2-46f5af 1005->1016 1017 46f57e-46f5a1 call 46eeb4 * 2 1005->1017 1019 46f5b5-46f5bc 1016->1019 1020 46f67e-46f685 1016->1020 1017->1016 1024 46f5be-46f5c5 1019->1024 1025 46f629-46f638 1019->1025 1021 46f687-46f6bd call 494cec 1020->1021 1022 46f6df-46f6f5 RegCloseKey 1020->1022 1021->1022 1024->1025 1029 46f5c7-46f5eb call 430bcc 1024->1029 1028 46f63b-46f648 1025->1028 1032 46f65f-46f678 call 430c08 call 46eeb4 1028->1032 1033 46f64a-46f657 1028->1033 1029->1028 1039 46f5ed-46f5ee 1029->1039 1042 46f67d 1032->1042 1033->1032 1035 46f659-46f65d 1033->1035 1035->1020 1035->1032 1041 46f5f0-46f616 call 40b24c call 479630 1039->1041 1047 46f623-46f625 1041->1047 1048 46f618-46f61e call 430bcc 1041->1048 1042->1020 1047->1041 1050 46f627 1047->1050 1048->1047 1050->1028
                                                                                    APIs
                                                                                      • Part of subcall function 0046EE44: RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
                                                                                      • Part of subcall function 0046EEB4: RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
                                                                                    • RegCloseKey.ADVAPI32(?,0046F6FD,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046F748,?,?,0049C1E0,00000000), ref: 0046F6F0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value$Close
                                                                                    • String ID: " /SILENT$5.5.3 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                                                                    • API String ID: 3391052094-3342197833
                                                                                    • Opcode ID: 41e5a022c9dfc144d242315d0234d20c9f1df57cded100a3ade253d049a3cf6c
                                                                                    • Instruction ID: 0d1426ff9ce9a688a4d167ea33859b9e50b28094dc6fe7db73e07d6bdcf854ec
                                                                                    • Opcode Fuzzy Hash: 41e5a022c9dfc144d242315d0234d20c9f1df57cded100a3ade253d049a3cf6c
                                                                                    • Instruction Fuzzy Hash: D1125935A001089BDB04EF95E881ADE73F5EB48304F24817BE8506B366EB79AD45CF5E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1051 492848-49287c call 403684 1054 49287e-49288d call 446f9c Sleep 1051->1054 1055 492892-49289f call 403684 1051->1055 1060 492d22-492d3c call 403420 1054->1060 1061 4928ce-4928db call 403684 1055->1061 1062 4928a1-4928c4 call 446ff8 call 403738 FindWindowA call 447278 1055->1062 1070 49290a-492917 call 403684 1061->1070 1071 4928dd-492905 call 446ff8 call 403738 FindWindowA call 447278 1061->1071 1080 4928c9 1062->1080 1078 492919-49295b call 446f9c * 4 SendMessageA call 447278 1070->1078 1079 492960-49296d call 403684 1070->1079 1071->1060 1078->1060 1090 4929bc-4929c9 call 403684 1079->1090 1091 49296f-4929b7 call 446f9c * 4 PostMessageA call 4470d0 1079->1091 1080->1060 1100 492a18-492a25 call 403684 1090->1100 1101 4929cb-492a13 call 446f9c * 4 SendNotifyMessageA call 4470d0 1090->1101 1091->1060 1113 492a52-492a5f call 403684 1100->1113 1114 492a27-492a4d call 446ff8 call 403738 RegisterClipboardFormatA call 447278 1100->1114 1101->1060 1125 492a61-492a9b call 446f9c * 3 SendMessageA call 447278 1113->1125 1126 492aa0-492aad call 403684 1113->1126 1114->1060 1125->1060 1138 492aaf-492aef call 446f9c * 3 PostMessageA call 4470d0 1126->1138 1139 492af4-492b01 call 403684 1126->1139 1138->1060 1152 492b48-492b55 call 403684 1139->1152 1153 492b03-492b43 call 446f9c * 3 SendNotifyMessageA call 4470d0 1139->1153 1164 492baa-492bb7 call 403684 1152->1164 1165 492b57-492b75 call 446ff8 call 42e394 1152->1165 1153->1060 1175 492bb9-492be5 call 446ff8 call 403738 call 446f9c GetProcAddress 1164->1175 1176 492c31-492c3e call 403684 1164->1176 1185 492b87-492b95 GetLastError call 447278 1165->1185 1186 492b77-492b85 call 447278 1165->1186 1206 492c21-492c2c call 4470d0 1175->1206 1207 492be7-492c1c call 446f9c * 2 call 447278 call 4470d0 1175->1207 1187 492c40-492c61 call 446f9c FreeLibrary call 4470d0 1176->1187 1188 492c66-492c73 call 403684 1176->1188 1194 492b9a-492ba5 call 447278 1185->1194 1186->1194 1187->1060 1203 492c98-492ca5 call 403684 1188->1203 1204 492c75-492c93 call 446ff8 call 403738 CreateMutexA 1188->1204 1194->1060 1215 492cdb-492ce8 call 403684 1203->1215 1216 492ca7-492cd9 call 48ccc8 call 403574 call 403738 OemToCharBuffA call 48cce0 1203->1216 1204->1060 1206->1060 1207->1060 1228 492cea-492d1c call 48ccc8 call 403574 call 403738 CharToOemBuffA call 48cce0 1215->1228 1229 492d1e 1215->1229 1216->1060 1228->1060 1229->1060
                                                                                    APIs
                                                                                    • Sleep.KERNEL32(00000000,00000000,00492D3D,?,?,?,?,00000000,00000000,00000000), ref: 00492888
                                                                                    • FindWindowA.USER32(00000000,00000000), ref: 004928B9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FindSleepWindow
                                                                                    • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                                                                    • API String ID: 3078808852-3310373309
                                                                                    • Opcode ID: 543bbb3fa16e1ad260fa6bca8d7f7bf65573201bf2c1e3a3e9abb38e798cd817
                                                                                    • Instruction ID: 092cd3663c6e49ee7eb77a287a3c2ed341282e51176ce6ebc4a466309821376d
                                                                                    • Opcode Fuzzy Hash: 543bbb3fa16e1ad260fa6bca8d7f7bf65573201bf2c1e3a3e9abb38e798cd817
                                                                                    • Instruction Fuzzy Hash: D9C182A0B042003BDB14BF3E9D4551F59A99F95708B119A3FB446EB78BCE7CEC0A4359

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1621 483a7c-483aa1 GetModuleHandleA GetProcAddress 1622 483b08-483b0d GetSystemInfo 1621->1622 1623 483aa3-483ab9 GetNativeSystemInfo GetProcAddress 1621->1623 1624 483b12-483b1b 1622->1624 1623->1624 1625 483abb-483ac6 GetCurrentProcess 1623->1625 1626 483b2b-483b32 1624->1626 1627 483b1d-483b21 1624->1627 1625->1624 1632 483ac8-483acc 1625->1632 1630 483b4d-483b52 1626->1630 1628 483b23-483b27 1627->1628 1629 483b34-483b3b 1627->1629 1633 483b29-483b46 1628->1633 1634 483b3d-483b44 1628->1634 1629->1630 1632->1624 1635 483ace-483ad5 call 45271c 1632->1635 1633->1630 1634->1630 1635->1624 1639 483ad7-483ae4 GetProcAddress 1635->1639 1639->1624 1640 483ae6-483afd GetModuleHandleA GetProcAddress 1639->1640 1640->1624 1641 483aff-483b06 1640->1641 1641->1624
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
                                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
                                                                                    • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
                                                                                    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
                                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
                                                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
                                                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
                                                                                    • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483B0D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleInfoModuleSystem$CurrentNativeProcess
                                                                                    • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                                                                    • API String ID: 2230631259-2623177817
                                                                                    • Opcode ID: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
                                                                                    • Instruction ID: d1db678d6bd555fecb25ccca0b477ef677e73c145b16f55f8d8b06b946339d0c
                                                                                    • Opcode Fuzzy Hash: 7dca9948a1095c4364ab55fa8ed369d502b26d1142efbcbd424e95be4cda74f5
                                                                                    • Instruction Fuzzy Hash: 7F1181C0204741A4DA00BFB94D45B6F65889B11F2AF040C7B6840AA287EABCEF44A76E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1647 468d88-468dc0 call 47c26c 1650 468dc6-468dd6 call 478e24 1647->1650 1651 468fa2-468fbc call 403420 1647->1651 1656 468ddb-468e20 call 4078f4 call 403738 call 42de1c 1650->1656 1662 468e25-468e27 1656->1662 1663 468e2d-468e42 1662->1663 1664 468f98-468f9c 1662->1664 1665 468e57-468e5e 1663->1665 1666 468e44-468e52 call 42dd4c 1663->1666 1664->1651 1664->1656 1668 468e60-468e82 call 42dd4c call 42dd64 1665->1668 1669 468e8b-468e92 1665->1669 1666->1665 1668->1669 1686 468e84 1668->1686 1670 468e94-468eb9 call 42dd4c * 2 1669->1670 1671 468eeb-468ef2 1669->1671 1693 468ebb-468ec4 call 4314f8 1670->1693 1694 468ec9-468edb call 42dd4c 1670->1694 1673 468ef4-468f06 call 42dd4c 1671->1673 1674 468f38-468f3f 1671->1674 1687 468f16-468f28 call 42dd4c 1673->1687 1688 468f08-468f11 call 4314f8 1673->1688 1680 468f41-468f75 call 42dd4c * 3 1674->1680 1681 468f7a-468f90 RegCloseKey 1674->1681 1680->1681 1686->1669 1687->1674 1701 468f2a-468f33 call 4314f8 1687->1701 1688->1687 1693->1694 1694->1671 1704 468edd-468ee6 call 4314f8 1694->1704 1701->1674 1704->1671
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegCloseKey.ADVAPI32(?,00468FA2,?,?,00000001,00000000,00000000,00468FBD,?,00000000,00000000,?), ref: 00468F8B
                                                                                    Strings
                                                                                    • %s\%s_is1, xrefs: 00468E05
                                                                                    • Inno Setup: Selected Components, xrefs: 00468EAA
                                                                                    • Inno Setup: Setup Type, xrefs: 00468E9A
                                                                                    • Inno Setup: Deselected Tasks, xrefs: 00468F19
                                                                                    • Inno Setup: Deselected Components, xrefs: 00468ECC
                                                                                    • Inno Setup: Icon Group, xrefs: 00468E66
                                                                                    • Inno Setup: User Info: Serial, xrefs: 00468F6D
                                                                                    • Inno Setup: User Info: Organization, xrefs: 00468F5A
                                                                                    • Inno Setup: Selected Tasks, xrefs: 00468EF7
                                                                                    • Inno Setup: User Info: Name, xrefs: 00468F47
                                                                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00468DE7
                                                                                    • Inno Setup: No Icons, xrefs: 00468E73
                                                                                    • Inno Setup: App Path, xrefs: 00468E4A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpen
                                                                                    • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                    • API String ID: 47109696-1093091907
                                                                                    • Opcode ID: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
                                                                                    • Instruction ID: 069c4cdb4b1287edb5c1b702bebeb6c44c7684ad2aa17a57d1fdfe9a2539746b
                                                                                    • Opcode Fuzzy Hash: b9928a5b5c0cf6c1dc91f6627cbb06318d05b30c5d76f15ccadbaf9fdfcb7506
                                                                                    • Instruction Fuzzy Hash: 6B51A330A006449BCB15DB65D881BDEB7F5EB48304F50857EE840AB391EB79AF01CB59

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 0042D898: GetWindowsDirectoryA.KERNEL32(?,00000104,00000000,00453DB4,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5), ref: 0042D8AB
                                                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                      • Part of subcall function 0042D8F0: GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                                                                                      • Part of subcall function 0042D8F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                                                                                    • SHGetKnownFolderPath.SHELL32(00499D30,00008000,00000000,?,00000000,0047C942), ref: 0047C846
                                                                                    • CoTaskMemFree.OLE32(?,0047C88B), ref: 0047C87E
                                                                                      • Part of subcall function 0042D208: GetEnvironmentVariableA.KERNEL32(00000000,00000000,00000000,?,?,00000000,0042DA3E,00000000,0042DAD0,?,?,?,0049B628,00000000,00000000), ref: 0042D233
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Directory$AddressEnvironmentFolderFreeHandleKnownModulePathProcSystemTaskVariableWindows
                                                                                    • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                    • API String ID: 3771764029-544719455
                                                                                    • Opcode ID: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
                                                                                    • Instruction ID: 88e29a10730232d74bbdb0c5b7d00c3ea12cf2700f44d19641833b453bfd909d
                                                                                    • Opcode Fuzzy Hash: 23963da8b4b34a95ffd58041a931adf40c150fbdd8371ea61f0364dbdea36cdf
                                                                                    • Instruction Fuzzy Hash: 1461CF74A00204AFDB10EBA5D8C2A9E7B69EB44319F90C47FE404A7392DB3C9A44CF5D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1949 423874-42387e 1950 4239a7-4239ab 1949->1950 1951 423884-4238a6 call 41f3c4 GetClassInfoA 1949->1951 1954 4238d7-4238e0 GetSystemMetrics 1951->1954 1955 4238a8-4238bf RegisterClassA 1951->1955 1957 4238e2 1954->1957 1958 4238e5-4238ef GetSystemMetrics 1954->1958 1955->1954 1956 4238c1-4238d2 call 408cbc call 40311c 1955->1956 1956->1954 1957->1958 1960 4238f1 1958->1960 1961 4238f4-423950 call 403738 call 4062e8 call 403400 call 42364c SetWindowLongA 1958->1961 1960->1961 1972 423952-423965 call 424178 SendMessageA 1961->1972 1973 42396a-423998 GetSystemMenu DeleteMenu * 2 1961->1973 1972->1973 1973->1950 1975 42399a-4239a2 DeleteMenu 1973->1975 1975->1950
                                                                                    APIs
                                                                                      • Part of subcall function 0041F3C4: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                                                                                    • GetClassInfoA.USER32(00400000,0042367C), ref: 0042389F
                                                                                    • RegisterClassA.USER32(00499630), ref: 004238B7
                                                                                    • GetSystemMetrics.USER32(00000000), ref: 004238D9
                                                                                    • GetSystemMetrics.USER32(00000001), ref: 004238E8
                                                                                    • SetWindowLongA.USER32(00410460,000000FC,0042368C), ref: 00423944
                                                                                    • SendMessageA.USER32(00410460,00000080,00000001,00000000), ref: 00423965
                                                                                    • GetSystemMenu.USER32(00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 00423970
                                                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C,0041EDA4), ref: 0042397F
                                                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 0042398C
                                                                                    • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,00410460,00000000,00000000,00400000,00000000,00000000,00000000), ref: 004239A2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                                                                    • String ID: |6B
                                                                                    • API String ID: 183575631-3009739247
                                                                                    • Opcode ID: 5571f2138a9ea83ce0d9c1dcd1b3cc51cb16f92404a0700befc21e2951ab6ca0
                                                                                    • Instruction ID: 5979ac727d64f3fe5c9a0a43452729076f54e0f9e4c251b9a4c28f9d6bed272f
                                                                                    • Opcode Fuzzy Hash: 5571f2138a9ea83ce0d9c1dcd1b3cc51cb16f92404a0700befc21e2951ab6ca0
                                                                                    • Instruction Fuzzy Hash: E63152B17402006AEB10AF69DC82F6A37989B14709F60017BFA44EF2D7C6BDED40876D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1977 47ce78-47cece call 42c3fc call 4035c0 call 47cb3c call 4525d8 1986 47ced0-47ced5 call 453344 1977->1986 1987 47ceda-47cee9 call 4525d8 1977->1987 1986->1987 1991 47cf03-47cf09 1987->1991 1992 47ceeb-47cef1 1987->1992 1995 47cf20-47cf48 call 42e394 * 2 1991->1995 1996 47cf0b-47cf11 1991->1996 1993 47cf13-47cf1b call 403494 1992->1993 1994 47cef3-47cef9 1992->1994 1993->1995 1994->1991 1997 47cefb-47cf01 1994->1997 2003 47cf6f-47cf89 GetProcAddress 1995->2003 2004 47cf4a-47cf6a call 4078f4 call 453344 1995->2004 1996->1993 1996->1995 1997->1991 1997->1993 2006 47cf95-47cfb2 call 403400 * 2 2003->2006 2007 47cf8b-47cf90 call 453344 2003->2007 2004->2003 2007->2006
                                                                                    APIs
                                                                                    • GetProcAddress.KERNEL32(74600000,SHGetFolderPathA), ref: 0047CF7A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$]xI$_isetup\_shfoldr.dll$shell32.dll$shfolder.dll
                                                                                    • API String ID: 190572456-256906917
                                                                                    • Opcode ID: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
                                                                                    • Instruction ID: ec9c61b31d03a4d18d2fa5da2167344019e511a33ceb5cf80618cf604467b355
                                                                                    • Opcode Fuzzy Hash: c4b8d3d93c7f37bb14fa31bc5bbe574b3393d33fbabbe9beac26f258e91ad005
                                                                                    • Instruction Fuzzy Hash: 20311D30E001499BCB10EFA5D5D1ADEB7B5EF44308F50847BE504E7281D778AE458B6D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2126 40631c-406336 GetModuleHandleA GetProcAddress 2127 406338 2126->2127 2128 40633f-40634c GetProcAddress 2126->2128 2127->2128 2129 406355-406362 GetProcAddress 2128->2129 2130 40634e 2128->2130 2131 406364-406366 SetProcessDEPPolicy 2129->2131 2132 406368-406369 2129->2132 2130->2129 2131->2132
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
                                                                                    • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                                                    • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                                                    • GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                                                    • SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModulePolicyProcess
                                                                                    • String ID: SetDllDirectoryW$SetProcessDEPPolicy$SetSearchPathMode$kernel32.dll
                                                                                    • API String ID: 3256987805-3653653586
                                                                                    • Opcode ID: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                                                                                    • Instruction ID: 935c6a5f7b98c90e27654dc67135d8c1f882d2ad5d8c1b9d0efaf55941893a49
                                                                                    • Opcode Fuzzy Hash: fb4db72500fb8039bf9e982fa136c472a352d03826636d66c2b82dec8efce00d
                                                                                    • Instruction Fuzzy Hash: 97E02D90380702ACEA1032B20D82F3B144C9B54B69B26543B7D56B51C7D9BDDD7059BD
                                                                                    APIs
                                                                                    • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                                                                                    • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                                                                                    • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                                                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                                                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongWindow$Prop
                                                                                    • String ID: 3A$yA
                                                                                    • API String ID: 3887896539-3278460822
                                                                                    • Opcode ID: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                                                                                    • Instruction ID: bcb4e109f9bb3244d1d15a250a8b19338fc20a7c4ef9bfc7c396c8b3ff51cb63
                                                                                    • Opcode Fuzzy Hash: d9856cee796f57cc1685d9958f98130356579251106e4d85d69cc018d86e5275
                                                                                    • Instruction Fuzzy Hash: 8C22D06508E3C05FE31B9B74896A5D57FA0EE13325B1D45DFC4C28B1A3D21E8A8BC71A

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2894 467180-46722a call 41461c call 41463c call 41461c call 41463c SHGetFileInfo 2903 46725f-46726a call 478e04 2894->2903 2904 46722c-467233 2894->2904 2909 46726c-4672b1 call 42c3fc call 40357c call 403738 ExtractIconA call 4670c0 2903->2909 2910 4672bb-4672ce call 47d33c 2903->2910 2904->2903 2905 467235-46725a ExtractIconA call 4670c0 2904->2905 2905->2903 2932 4672b6 2909->2932 2915 4672d0-4672da call 47d33c 2910->2915 2916 4672df-4672e3 2910->2916 2915->2916 2919 4672e5-467308 call 403738 SHGetFileInfo 2916->2919 2920 46733d-467371 call 403400 * 2 2916->2920 2919->2920 2928 46730a-467311 2919->2928 2928->2920 2931 467313-467338 ExtractIconA call 4670c0 2928->2931 2931->2920 2932->2920
                                                                                    APIs
                                                                                    • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 00467223
                                                                                    • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467249
                                                                                      • Part of subcall function 004670C0: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00467158
                                                                                      • Part of subcall function 004670C0: DestroyCursor.USER32(00000000), ref: 0046716E
                                                                                    • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004672A0
                                                                                    • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00467301
                                                                                    • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00467327
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                                                                    • String ID: c:\directory$shell32.dll$%H
                                                                                    • API String ID: 3376378930-166502273
                                                                                    • Opcode ID: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
                                                                                    • Instruction ID: 732e1a1751fb8a235258c93266195bfa595ebd68417bad8a6af0601d960a2915
                                                                                    • Opcode Fuzzy Hash: d7a251f7ede599729126a20c6e5bc656e487c76ea0efebb03c6af550fa195c4c
                                                                                    • Instruction Fuzzy Hash: 8A516070604244AFD710DF65CD8AFDFB7A8EB48308F1081A6F80897351D6789E81DA59
                                                                                    APIs
                                                                                    • GetActiveWindow.USER32 ref: 0042F58F
                                                                                    • GetFocus.USER32 ref: 0042F597
                                                                                    • RegisterClassA.USER32(004997AC), ref: 0042F5B8
                                                                                    • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F68C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F5F6
                                                                                    • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F63C
                                                                                    • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F64D
                                                                                    • SetFocus.USER32(00000000,00000000,0042F66F,?,?,?,00000001,00000000,?,00458352,00000000,0049B628), ref: 0042F654
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                                                                    • String ID: TWindowDisabler-Window
                                                                                    • API String ID: 3167913817-1824977358
                                                                                    • Opcode ID: d82bdac47665a0423d7aef7e4f95abac113c6b4ba7ee72313a02f6ddbd37ff30
                                                                                    • Instruction ID: c3989f54cd535b42bfd745bd8d6279a550c1ea008e6f4be51b2d228796931bcd
                                                                                    • Opcode Fuzzy Hash: d82bdac47665a0423d7aef7e4f95abac113c6b4ba7ee72313a02f6ddbd37ff30
                                                                                    • Instruction Fuzzy Hash: B021A170740710BAE310EF66AD43F1A76B8EB04B44F91853BF604AB2E1D7B86D0586AD
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                                                                    • API String ID: 1646373207-2130885113
                                                                                    • Opcode ID: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
                                                                                    • Instruction ID: a781b9bdaab79611976bfea65fa4e072d6e85bd62b4b6e26dfe65079d72397a7
                                                                                    • Opcode Fuzzy Hash: d7661fd9f0913dad122060e2c1ded37189c483bc636f4dff06c0b7ded89dfa78
                                                                                    • Instruction Fuzzy Hash: EA01D470240B00FED301AF63AD12F663A58D7557ABF6044BBFC14965C2C77C4A088E6D
                                                                                    APIs
                                                                                    • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430948
                                                                                    • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430957
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00430971
                                                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00430992
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                                                                    • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                                                                    • API String ID: 4130936913-2943970505
                                                                                    • Opcode ID: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                                                                                    • Instruction ID: 0bd92e6c8c1c5a5b8444157758b44b4e11dae02c37acc47d2edddbd1fb793b69
                                                                                    • Opcode Fuzzy Hash: 8a088dfdc0b2c62b7d21c5c596ec815df7ae76573c78c741c8a86d6eee6cb681
                                                                                    • Instruction Fuzzy Hash: 22F012B0458340DEE300EB65994271E7BD0EF58718F50467FF498A6392D7795904CB5F
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C,00000000), ref: 004551BA
                                                                                    • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,0045522C,0045522C,?,0045522C), ref: 004551C7
                                                                                      • Part of subcall function 00454F7C: WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                                                                                      • Part of subcall function 00454F7C: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                                                                                      • Part of subcall function 00454F7C: GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                                                                                      • Part of subcall function 00454F7C: CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                                                                    • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmd.exe" /C "
                                                                                    • API String ID: 854858120-615399546
                                                                                    • Opcode ID: 5ea26466aa0b1bd12af3311b8e232ebea4e464fdb3bb6eef9ccee3db0f285c88
                                                                                    • Instruction ID: 058baa7e90e176347c833b132b7c272bf8058e823d6e061bdbf2f6311869cd9e
                                                                                    • Opcode Fuzzy Hash: 5ea26466aa0b1bd12af3311b8e232ebea4e464fdb3bb6eef9ccee3db0f285c88
                                                                                    • Instruction Fuzzy Hash: 41516D34B0074DABCF10EFA5D852BDEBBB9AF44305F50447BB804B7292D7789A098B59
                                                                                    APIs
                                                                                    • LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                                                                                    • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                                                                                    • OemToCharA.USER32(?,?), ref: 0042375C
                                                                                    • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Char$FileIconLoadLowerModuleName
                                                                                    • String ID: 2$MAINICON
                                                                                    • API String ID: 3935243913-3181700818
                                                                                    • Opcode ID: a0d1a492a3e1df344d79b5ede7937f80cf878dadafa44837ceada302c6d607ca
                                                                                    • Instruction ID: 339a64ebbf2375270c19ef2cfa2d714624ee8dcb7e06b01b5ae6522dc3b50067
                                                                                    • Opcode Fuzzy Hash: a0d1a492a3e1df344d79b5ede7937f80cf878dadafa44837ceada302c6d607ca
                                                                                    • Instruction Fuzzy Hash: 243181B0A042549ADF10EF29D8C57C67BA8AF14308F4441BAE844DB393D7BED988CB59
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 00495519
                                                                                      • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0049553B
                                                                                    • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495AB9), ref: 0049554F
                                                                                    • GetTextMetricsA.GDI32(00000000,?), ref: 00495571
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0049558E
                                                                                    Strings
                                                                                    • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00495546
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Text$CreateExtentFontIndirectMetricsObjectPointReleaseSelect
                                                                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                                                                    • API String ID: 2948443157-222967699
                                                                                    • Opcode ID: 15e89f7ca813e7522845c960856b2cdc022ede195b48aa860a28df6e22a0f939
                                                                                    • Instruction ID: fbfe8d588f566b1ae935688c8d8bbf43f3780a3d17a9f30f48774e54417b88ea
                                                                                    • Opcode Fuzzy Hash: 15e89f7ca813e7522845c960856b2cdc022ede195b48aa860a28df6e22a0f939
                                                                                    • Instruction Fuzzy Hash: 98018476A04704BFEB05DBE9CC41E5EB7EDEB48714F614476F604E7281D678AE008B28
                                                                                    APIs
                                                                                    • GetCurrentProcessId.KERNEL32(00000000), ref: 00418F3D
                                                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F5E
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00418F79
                                                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F9A
                                                                                      • Part of subcall function 004230C8: GetDC.USER32(00000000), ref: 0042311E
                                                                                      • Part of subcall function 004230C8: EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                                                                                      • Part of subcall function 004230C8: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                                                                                      • Part of subcall function 004230C8: ReleaseDC.USER32(00000000,00000000), ref: 00423144
                                                                                      • Part of subcall function 0042368C: LoadIconA.USER32(00400000,MAINICON), ref: 0042371C
                                                                                      • Part of subcall function 0042368C: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 00423749
                                                                                      • Part of subcall function 0042368C: OemToCharA.USER32(?,?), ref: 0042375C
                                                                                      • Part of subcall function 0042368C: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418FE6,00000000,?,?,?,00000001), ref: 0042379C
                                                                                      • Part of subcall function 0041F118: GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                                                                                      • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                                                                                      • Part of subcall function 0041F118: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                                                                                      • Part of subcall function 0041F118: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                                                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                                                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                                                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                                                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                                                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                                                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                                                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                                                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                                                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                                                                                      • Part of subcall function 0041F118: GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$AtomCharCurrentErrorGlobalLoadMode$CapsDeviceEnumFileFontsIconLibraryLowerModuleNameProcessReleaseThreadVersion
                                                                                    • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                                                                    • API String ID: 316262546-2767913252
                                                                                    • Opcode ID: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                                                                                    • Instruction ID: d883a59e21ed3b4d0722d018b4a025de81f9e45e1fd093e44b5ebaba0e30331f
                                                                                    • Opcode Fuzzy Hash: b417f06b73a7dba032b12b865c8ed9bc6bb92a8bfb887f153b822e9fb73695be
                                                                                    • Instruction Fuzzy Hash: AC115E706142419AD740FF76A94235A7BE1DF64308F40943FF448A7391DB3DA9448B5F
                                                                                    APIs
                                                                                    • SetWindowLongA.USER32(?,000000FC,?), ref: 00413664
                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0041366F
                                                                                    • GetWindowLongA.USER32(?,000000F4), ref: 00413681
                                                                                    • SetWindowLongA.USER32(?,000000F4,?), ref: 00413694
                                                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136AB
                                                                                    • SetPropA.USER32(?,00000000,00000000), ref: 004136C2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: LongWindow$Prop
                                                                                    • String ID:
                                                                                    • API String ID: 3887896539-0
                                                                                    • Opcode ID: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                                                                                    • Instruction ID: 06abc153636d574f2b9d5b42ed2ef1d3d1989bf2b09c04f5b7aa0ee96fd2bcf7
                                                                                    • Opcode Fuzzy Hash: 7846fecbe383e6d7fdaea4169180c186d89bab15e88d328ea810806c298c4441
                                                                                    • Instruction Fuzzy Hash: 1011C975100244BFEF00DF9DDC84EDA37E8EB19364F144666B958DB2A2D738DD908B68
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,0045586F,?,00000000,004558AF), ref: 004557B5
                                                                                    Strings
                                                                                    • PendingFileRenameOperations, xrefs: 00455754
                                                                                    • WININIT.INI, xrefs: 004557E4
                                                                                    • PendingFileRenameOperations2, xrefs: 00455784
                                                                                    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455738
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpen
                                                                                    • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                                                                    • API String ID: 47109696-2199428270
                                                                                    • Opcode ID: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
                                                                                    • Instruction ID: 0fa1da25f67206326559771d92c7e47b52ca8d856d575cc5f046ac455f5bab2a
                                                                                    • Opcode Fuzzy Hash: 430bb035026106b65f85e2b07525b73901b650abba9068f13605831850c1f819
                                                                                    • Instruction Fuzzy Hash: FF51A974E006089FDB10EF61DC51AEEB7B9EF44305F50857BEC04A7292DB78AE49CA58
                                                                                    APIs
                                                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC27
                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,0047CCEA,?,?,00000000,0049B628,00000000,00000000,?,00498539,00000000,004986E2,?,00000000), ref: 0047CC30
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                    • String ID: Created temporary directory: $\_setup64.tmp$_isetup
                                                                                    • API String ID: 1375471231-2952887711
                                                                                    • Opcode ID: 18b8a6295044c03030742dd0e1a53df86680db30ea117cbe65252b99daff8b31
                                                                                    • Instruction ID: e6577b7b61f0e0a35e690824fc442bae28cfcbc8f9cba78cd8161ab2dbd6b5d1
                                                                                    • Opcode Fuzzy Hash: 18b8a6295044c03030742dd0e1a53df86680db30ea117cbe65252b99daff8b31
                                                                                    • Instruction Fuzzy Hash: E6412834A001099BDB11EFA5D882ADEB7B5EF45309F50843BE81577392DA38AE05CF68
                                                                                    APIs
                                                                                    • EnumWindows.USER32(00423A1C), ref: 00423AA8
                                                                                    • GetWindow.USER32(?,00000003), ref: 00423ABD
                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                                                                                    • SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$EnumLongWindows
                                                                                    • String ID: \AB
                                                                                    • API String ID: 4191631535-3948367934
                                                                                    • Opcode ID: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
                                                                                    • Instruction ID: 3ad81c14f5822e14e615a382c86082b2427cd388a5bf15486a3129e996868218
                                                                                    • Opcode Fuzzy Hash: 1f387ac1e946b45dcea70a74dde1e3cf145931a60cd8f654a7309261af8d74ee
                                                                                    • Instruction Fuzzy Hash: D6115E70700610ABDB109F28E885F5677E8EB08715F10026AF994AB2E3C378ED41CB59
                                                                                    APIs
                                                                                    • RegDeleteKeyA.ADVAPI32(00000000,00000000), ref: 0042DE50
                                                                                    • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DFEB,00000000,0042E003,?,?,?,?,00000006,?,00000000,0049785D), ref: 0042DE6B
                                                                                    • GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 0042DE71
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressDeleteHandleModuleProc
                                                                                    • String ID: RegDeleteKeyExA$advapi32.dll
                                                                                    • API String ID: 588496660-1846899949
                                                                                    • Opcode ID: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                                                                                    • Instruction ID: e7246de0df94fba710dd2820c0ca51643d5dd29c3ac0bea476bad59fd0e01b91
                                                                                    • Opcode Fuzzy Hash: ed1542cdc99e60fdc1e6205037aed1b156b4601bf62b1d4fa5b097ff81e7402e
                                                                                    • Instruction Fuzzy Hash: 73E06DF1B41B30AAD72022657C8ABA33729DB75365F658437F105AD19183FC2C50CE9D
                                                                                    Strings
                                                                                    • NextButtonClick, xrefs: 0046BC4C
                                                                                    • PrepareToInstall failed: %s, xrefs: 0046BE6E
                                                                                    • Need to restart Windows? %s, xrefs: 0046BE95
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Need to restart Windows? %s$NextButtonClick$PrepareToInstall failed: %s
                                                                                    • API String ID: 0-2329492092
                                                                                    • Opcode ID: bdd1d04c3163942a70fe70ce9c3da0cdba0d450c43b562cfb8d9ec13df8274e7
                                                                                    • Instruction ID: 9de4db1b3e70fdebeced0fe060001c857bcfdee1b2562a0b259a97201065334e
                                                                                    • Opcode Fuzzy Hash: bdd1d04c3163942a70fe70ce9c3da0cdba0d450c43b562cfb8d9ec13df8274e7
                                                                                    • Instruction Fuzzy Hash: 46D12F34A00108DFCB14EB99D985AED77F5EF49304F5440BAE404EB362D778AE85CB9A
                                                                                    APIs
                                                                                    • SetActiveWindow.USER32(?,?,00000000,004833D5), ref: 004831A8
                                                                                    • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00483246
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ActiveChangeNotifyWindow
                                                                                    • String ID: $Need to restart Windows? %s
                                                                                    • API String ID: 1160245247-4200181552
                                                                                    • Opcode ID: 00647651f2966e2d6c0ac7b0a33bca8c0b176202d01056079f53a530b7b0addf
                                                                                    • Instruction ID: 855c298393525188f16043e43c8caa20abfdb27870bda8f6eb76b0fac02994d3
                                                                                    • Opcode Fuzzy Hash: 00647651f2966e2d6c0ac7b0a33bca8c0b176202d01056079f53a530b7b0addf
                                                                                    • Instruction Fuzzy Hash: 7E918F34A042449FDB10EF69D8C6BAD77E0AF55708F5484BBE8009B362DB78AE05CB5D
                                                                                    APIs
                                                                                      • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                    • GetLastError.KERNEL32(00000000,0046FCD9,?,?,0049C1E0,00000000), ref: 0046FBB6
                                                                                    • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046FC30
                                                                                    • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046FC55
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ChangeNotify$ErrorFullLastNamePath
                                                                                    • String ID: Creating directory: %s
                                                                                    • API String ID: 2451617938-483064649
                                                                                    • Opcode ID: 1aeec9fc70de36e1ff09abf6a814cf31666cc4aa73152690207cd024c9806782
                                                                                    • Instruction ID: a145aa70eb484b5d007d33f2831cd5d1f219efd535f83afbcf26a903565c5eea
                                                                                    • Opcode Fuzzy Hash: 1aeec9fc70de36e1ff09abf6a814cf31666cc4aa73152690207cd024c9806782
                                                                                    • Instruction Fuzzy Hash: 7D512F74E00248ABDB01DBA5D982ADEBBF4AF49304F50847AEC50B7382D7795E08CB59
                                                                                    APIs
                                                                                    • GetProcAddress.KERNEL32(00000000,SfcIsFileProtected), ref: 00454E82
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00454F48), ref: 00454EEC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressByteCharMultiProcWide
                                                                                    • String ID: SfcIsFileProtected$sfc.dll
                                                                                    • API String ID: 2508298434-591603554
                                                                                    • Opcode ID: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
                                                                                    • Instruction ID: 709c5f55a6f5f8285c9c61fd8393730e8027effee09c5548c71846991cac34f0
                                                                                    • Opcode Fuzzy Hash: bb559eb6b427547f50ac361efa45694dce53a5facbc0d321e4ca2111cb35c873
                                                                                    • Instruction Fuzzy Hash: E8419671A04318DBEB20EF59DC85B9DB7B8AB4430DF5041B7A908A7293D7785F88CA1C
                                                                                    APIs
                                                                                    • GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                                                                                    • UnregisterClassA.USER32(?,00400000), ref: 004164AB
                                                                                    • RegisterClassA.USER32(?), ref: 004164CE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Class$InfoRegisterUnregister
                                                                                    • String ID: @
                                                                                    • API String ID: 3749476976-2766056989
                                                                                    • Opcode ID: e22f6c67811b2b5558443c1260ef7bf478b7365ff617af782cc186aba818ddba
                                                                                    • Instruction ID: c77080f262680b7bd3c4c6a37e0a11d074b1995aa9dd52ebf92fb76dd285a693
                                                                                    • Opcode Fuzzy Hash: e22f6c67811b2b5558443c1260ef7bf478b7365ff617af782cc186aba818ddba
                                                                                    • Instruction Fuzzy Hash: B8316D702042409BD720EF69C981B9B77E5AB89308F04457FF949DB392DB39DD44CB6A
                                                                                    APIs
                                                                                    • 74D31520.VERSION(00000000,?,?,?,00497900), ref: 00452530
                                                                                    • 74D31500.VERSION(00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,00497900), ref: 0045255D
                                                                                    • 74D31540.VERSION(?,004525D4,?,?,00000000,?,00000000,?,00000000,004525AB,?,00000000,?,?,?,00497900), ref: 00452577
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: D31500D31520D31540
                                                                                    • String ID: %E
                                                                                    • API String ID: 1003763464-175436132
                                                                                    • Opcode ID: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                                                                                    • Instruction ID: f5dca5bfdad9659449235e2d7a4f424f1fde127461be4d93bb02e754cc996b3f
                                                                                    • Opcode Fuzzy Hash: f18440ec30d6a8502c14f0dca7f1c7caee1af709ad5b943411f89d38bbe9f821
                                                                                    • Instruction Fuzzy Hash: D2218331A00608BFDB01DAA989519AFB7FCEB4A300F554477F800E7242E6B9AE04C765
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 0044B401
                                                                                    • SelectObject.GDI32(?,00000000), ref: 0044B424
                                                                                    • ReleaseDC.USER32(00000000,?), ref: 0044B457
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ObjectReleaseSelect
                                                                                    • String ID: %H
                                                                                    • API String ID: 1831053106-1959103961
                                                                                    • Opcode ID: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
                                                                                    • Instruction ID: 242bcfed98594cbdcf51f2854abe94a1ec69c13560e3a72339b9f4254961cc58
                                                                                    • Opcode Fuzzy Hash: 613a86eb96bd964688756472f8397141eb38d2c4caf6b0936a0a8cf616000036
                                                                                    • Instruction Fuzzy Hash: 62216570A04248AFEB15DFA6C841B9F7BB9DB49304F11806AF904A7682D778D940CB59
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0044B14C,?,%H,?,?), ref: 0044B11E
                                                                                    • DrawTextW.USER32(?,?,00000000,?,?), ref: 0044B131
                                                                                    • DrawTextA.USER32(?,00000000,00000000,?,?), ref: 0044B165
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: DrawText$ByteCharMultiWide
                                                                                    • String ID: %H
                                                                                    • API String ID: 65125430-1959103961
                                                                                    • Opcode ID: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                                                                                    • Instruction ID: fec6fabf6d030a51aab30bc406273ff78954f96defe81b00f374268ef7e1f253
                                                                                    • Opcode Fuzzy Hash: b9978a40832644be7eb99ff61e6ae739c3599586bb389d309c0d7579617ef2e1
                                                                                    • Instruction Fuzzy Hash: 2A11CBB27046047FEB00DB6A9C91D6F77ECDB49750F10817BF504D72D0D6399E018669
                                                                                    APIs
                                                                                    • SHAutoComplete.SHLWAPI(00000000,00000001), ref: 0042EDC5
                                                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                      • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                      • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                    • GetProcAddress.KERNEL32(00000000,SHAutoComplete), ref: 0042EDA8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressAutoCompleteDirectoryErrorLibraryLoadModeProcSystem
                                                                                    • String ID: SHAutoComplete$shlwapi.dll
                                                                                    • API String ID: 395431579-1506664499
                                                                                    • Opcode ID: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
                                                                                    • Instruction ID: e807f919b0f5f47641bb36d66eaae5ab4e0d2818c3cb02d7dc2bc8906116ae4e
                                                                                    • Opcode Fuzzy Hash: 42f9dcb05abbf77f41298dba7160eccf52289638d4fdae2cac913a0c4d077c72
                                                                                    • Instruction Fuzzy Hash: 3311A330B00319BBD711EB62FD85B8E7BA8DB55704F90447BF40066291DBB8AE05C65D
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegCloseKey.ADVAPI32(?,00455A7B,?,00000001,00000000), ref: 00455A6E
                                                                                    Strings
                                                                                    • PendingFileRenameOperations2, xrefs: 00455A4F
                                                                                    • PendingFileRenameOperations, xrefs: 00455A40
                                                                                    • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00455A1C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpen
                                                                                    • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                                                                    • API String ID: 47109696-2115312317
                                                                                    • Opcode ID: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
                                                                                    • Instruction ID: e9356c19d9a7d2c1b22529064790e486fb2be540b5bf165494b3782c633fa2c0
                                                                                    • Opcode Fuzzy Hash: 336a8554af3216e9fad4f98949cc8fac3f30a8fbf7097481dd1a9e766711aba3
                                                                                    • Instruction Fuzzy Hash: A3F0F671304A08BFDB04D661DC62A3B739CE744725FB08167F800CB682EA7CBD04915C
                                                                                    APIs
                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472301
                                                                                    • FindClose.KERNEL32(000000FF,0047232C,00472325,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 0047231F
                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1), ref: 00472423
                                                                                    • FindClose.KERNEL32(000000FF,0047244E,00472447,?,00000000,?,0049C1E0,00000000,00472515,?,00000000,?,00000000,?,004726E1,?), ref: 00472441
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFileNext
                                                                                    • String ID:
                                                                                    • API String ID: 2066263336-0
                                                                                    • Opcode ID: 5852171562c0697583dfb39d2e83bd074d15792751f52c1309e6650eed3a72c0
                                                                                    • Instruction ID: ff38abb04fb96460afd2c3532f2e87b2ffc4f25b99c166b2ff4046d92e8ebf4f
                                                                                    • Opcode Fuzzy Hash: 5852171562c0697583dfb39d2e83bd074d15792751f52c1309e6650eed3a72c0
                                                                                    • Instruction Fuzzy Hash: 3EC14C3490424D9FCF11DFA5C981ADEBBB8FF49304F5080AAE808B3251D7789A46CF58
                                                                                    APIs
                                                                                    • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?,00000000), ref: 0047FD9E
                                                                                    • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?,?), ref: 0047FDAB
                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147), ref: 0047FEA0
                                                                                    • FindClose.KERNEL32(000000FF,0047FECB,0047FEC4,?,?,?,?,00000000,0047FEF1,?,00000000,00000000,?,?,00481147,?), ref: 0047FEBE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFileNext
                                                                                    • String ID:
                                                                                    • API String ID: 2066263336-0
                                                                                    • Opcode ID: 56ee50c7cb7fa2545e62f1cc5d9b880787f4aaf8996287a3801f00069153f90f
                                                                                    • Instruction ID: 5570db9595827249690d4c596f970be035a6cb65fb6c4bc3b070d2a6e7e06d26
                                                                                    • Opcode Fuzzy Hash: 56ee50c7cb7fa2545e62f1cc5d9b880787f4aaf8996287a3801f00069153f90f
                                                                                    • Instruction Fuzzy Hash: 34512D71A006499FCB21DF65CC45ADEB7B8EB88319F1084BAA818A7351D7389F89CF54
                                                                                    APIs
                                                                                    • GetMenu.USER32(00000000), ref: 00421361
                                                                                    • SetMenu.USER32(00000000,00000000), ref: 0042137E
                                                                                    • SetMenu.USER32(00000000,00000000), ref: 004213B3
                                                                                    • SetMenu.USER32(00000000,00000000), ref: 004213CF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu
                                                                                    • String ID:
                                                                                    • API String ID: 3711407533-0
                                                                                    • Opcode ID: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                                                                                    • Instruction ID: 68e231870b0c3442489bede8fdcf2aa1db34e154331db007d9f14f65c1163b63
                                                                                    • Opcode Fuzzy Hash: 011238806e8749de4259267c2425fab43e1a23b2a7ed20fe69ece2c0c4e48eae
                                                                                    • Instruction Fuzzy Hash: 4641AE3070425447EB20EA3AA9857AB36925B20308F4841BFFC40DF7A3CA7CDD45839D
                                                                                    APIs
                                                                                    • SendMessageA.USER32(?,?,?,?), ref: 00416B84
                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00416B9E
                                                                                    • SetBkColor.GDI32(?,00000000), ref: 00416BB8
                                                                                    • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416BE0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$CallMessageProcSendTextWindow
                                                                                    • String ID:
                                                                                    • API String ID: 601730667-0
                                                                                    • Opcode ID: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                    • Instruction ID: 4ea48ea5c9b96bae81565ca4ce64eb356f32bd46963e120bc97d04dec40f2685
                                                                                    • Opcode Fuzzy Hash: 072521f5090f240ceba025e33949739ce14f97652003165ca459573163e57643
                                                                                    • Instruction Fuzzy Hash: BC115171705604AFD710EE6ECC84E8777ECEF49310715887EB959CB612C638F8418B69
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 0042311E
                                                                                    • EnumFontsA.GDI32(00000000,00000000,00423068,00410460,00000000,?,?,00000000,?,00418FD3,00000000,?,?,?,00000001), ref: 00423131
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00423139
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00423144
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDeviceEnumFontsRelease
                                                                                    • String ID:
                                                                                    • API String ID: 2698912916-0
                                                                                    • Opcode ID: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                                                                                    • Instruction ID: a9d24610abdaa6694e735d00c6d38f20457f2ac5f1468c421a1b182fb2ef8db9
                                                                                    • Opcode Fuzzy Hash: ae3b46bdf4144dece9088701a44aa945a4d7eb571b2044da6dc5baa79edeb2ca
                                                                                    • Instruction Fuzzy Hash: 8D01CC716042102AE700BF6A5C82B9B3AA49F01319F40027BF808AA3C6DA7E980547AE
                                                                                    APIs
                                                                                      • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                    • FlushFileBuffers.KERNEL32(?), ref: 0045C499
                                                                                    Strings
                                                                                    • EndOffset range exceeded, xrefs: 0045C3CD
                                                                                    • NumRecs range exceeded, xrefs: 0045C396
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$BuffersFlush
                                                                                    • String ID: EndOffset range exceeded$NumRecs range exceeded
                                                                                    • API String ID: 3593489403-659731555
                                                                                    • Opcode ID: 7579bb90891bfddca92618b6050c99dc039493a8a69e6275f659694612805aa2
                                                                                    • Instruction ID: 69b4fe9c868b7cadc716880164946defc5db249b4b2908964217ac1dcc813941
                                                                                    • Opcode Fuzzy Hash: 7579bb90891bfddca92618b6050c99dc039493a8a69e6275f659694612805aa2
                                                                                    • Instruction Fuzzy Hash: 4F617334A002588FDB25DF25C891AD9B7B5AF49305F0084DAED88AB353D674AEC8CF54
                                                                                    APIs
                                                                                      • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00498BB6), ref: 0040334B
                                                                                      • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00498BB6), ref: 00403356
                                                                                      • Part of subcall function 0040631C: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498BC0), ref: 00406322
                                                                                      • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0040632F
                                                                                      • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00406345
                                                                                      • Part of subcall function 0040631C: GetProcAddress.KERNEL32(00000000,SetProcessDEPPolicy), ref: 0040635B
                                                                                      • Part of subcall function 0040631C: SetProcessDEPPolicy.KERNEL32(00000001,00000000,SetProcessDEPPolicy,00000000,SetSearchPathMode,kernel32.dll,?,00498BC0), ref: 00406366
                                                                                      • Part of subcall function 004063C4: 6F541CD0.COMCTL32(00498BC5), ref: 004063C4
                                                                                      • Part of subcall function 00410764: GetCurrentThreadId.KERNEL32 ref: 004107B2
                                                                                      • Part of subcall function 00419040: GetVersion.KERNEL32(00498BDE), ref: 00419040
                                                                                      • Part of subcall function 0044F744: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
                                                                                      • Part of subcall function 0044F744: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                                                                                      • Part of subcall function 0044FC10: GetVersionExA.KERNEL32(0049B790,00498BF7), ref: 0044FC1F
                                                                                      • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 00453210
                                                                                      • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453216
                                                                                      • Part of subcall function 004531F0: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00453289,?,?,?,?,00000000,?,00498C06), ref: 0045322A
                                                                                      • Part of subcall function 004531F0: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00453230
                                                                                      • Part of subcall function 004570B4: GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                                                                                      • Part of subcall function 004645F4: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
                                                                                      • Part of subcall function 004645F4: GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                                                                                      • Part of subcall function 0046CDF0: GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
                                                                                      • Part of subcall function 00478C20: GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
                                                                                      • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
                                                                                      • Part of subcall function 00478C20: GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
                                                                                      • Part of subcall function 00483F88: GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
                                                                                      • Part of subcall function 00495BB4: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00495BCD
                                                                                    • SetErrorMode.KERNEL32(00000001,00000000,00498C6C), ref: 00498C3E
                                                                                      • Part of subcall function 00498968: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
                                                                                      • Part of subcall function 00498968: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
                                                                                      • Part of subcall function 004244D4: SendMessageA.USER32(?,0000B020,00000000,?), ref: 004244F3
                                                                                      • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                    • ShowWindow.USER32(?,00000005,00000000,00498C6C), ref: 00498C9F
                                                                                      • Part of subcall function 004825C8: SetActiveWindow.USER32(?), ref: 00482676
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorF541FormatLibraryLineLoadMessageModePolicyProcessRegisterSendShowTextThread
                                                                                    • String ID: Setup
                                                                                    • API String ID: 291738113-3839654196
                                                                                    • Opcode ID: 1594606edc507442c6549f9e4ebdc225aad6ad90dc9fc57b5479ce1c0ac5814d
                                                                                    • Instruction ID: b535e719d7157e93998cc10f536158ae488692691c8c4e2dacdcbf5c7207fd3e
                                                                                    • Opcode Fuzzy Hash: 1594606edc507442c6549f9e4ebdc225aad6ad90dc9fc57b5479ce1c0ac5814d
                                                                                    • Instruction Fuzzy Hash: 873104312446409FD601BBBBFD5392D3B94EF8A728B91447FF80496693DE3C68508A7E
                                                                                    APIs
                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DC3C
                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DD38), ref: 0042DCAC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: QueryValue
                                                                                    • String ID: $=H
                                                                                    • API String ID: 3660427363-3538597426
                                                                                    • Opcode ID: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                                                                                    • Instruction ID: 5bd1c55a509b6dee259ffcee94d68868fe84ce326e73fb4cf6662c4527ef549e
                                                                                    • Opcode Fuzzy Hash: b62dc44b296d1c54c0416b8d239270b5fe200a79a82432283709fd1da487490f
                                                                                    • Instruction Fuzzy Hash: 9D414171E00529ABDB11DF95D881BAFB7B8EB04704F918466E810F7241D778AE00CBA5
                                                                                    APIs
                                                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A6A
                                                                                    • GetLastError.KERNEL32(00000000,00000000,?,00000000,00453B13,?,?,00000000,0049B628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00453A73
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                    • String ID: .tmp
                                                                                    • API String ID: 1375471231-2986845003
                                                                                    • Opcode ID: 4f6049b6d10a737b279f92eac6e2edda550f3c0c3ab583747f9ca22f4cbd9d09
                                                                                    • Instruction ID: 2c169793aa1d4e8b0ae54453200dd0eeecd34c8d921a2c5b894f13e1de3ec917
                                                                                    • Opcode Fuzzy Hash: 4f6049b6d10a737b279f92eac6e2edda550f3c0c3ab583747f9ca22f4cbd9d09
                                                                                    • Instruction Fuzzy Hash: BD213575A002089BDB01EFA5C8429DEB7B8EF49305F50457BE801B7343DA3CAF058B69
                                                                                    APIs
                                                                                      • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00483A8D
                                                                                      • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00483A9A
                                                                                      • Part of subcall function 00483A7C: GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00483AA8
                                                                                      • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 00483AB0
                                                                                      • Part of subcall function 00483A7C: GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 00483ABC
                                                                                      • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryA), ref: 00483ADD
                                                                                      • Part of subcall function 00483A7C: GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00483AF0
                                                                                      • Part of subcall function 00483A7C: GetProcAddress.KERNEL32(00000000,advapi32.dll), ref: 00483AF6
                                                                                      • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483DB6
                                                                                      • Part of subcall function 00483DA8: GetVersionExA.KERNEL32(0000009C,?,00483FBA,00000000,0048408F,?,?,?,?,?,00498C29), ref: 00483E08
                                                                                      • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                      • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                    • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 00484077
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModuleVersion$CurrentErrorInfoLibraryLoadModeNativeProcessSystem
                                                                                    • String ID: SHGetKnownFolderPath$shell32.dll
                                                                                    • API String ID: 3869789854-2936008475
                                                                                    • Opcode ID: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
                                                                                    • Instruction ID: 8066e8dcbdf9c94243579ba2519058cd674f052446347c20ec70bbddfecd8a90
                                                                                    • Opcode Fuzzy Hash: 24bfbd8baf235fcbd7404033d7799f009542697b8823181e059981251f96c700
                                                                                    • Instruction Fuzzy Hash: 1021F1B06103116AC700BFBE599611B3BA5EB9570C380893FF904DB391D77E68149B6E
                                                                                    APIs
                                                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,0047C92C,00000000,0047C942), ref: 0047C63A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close
                                                                                    • String ID: RegisteredOrganization$RegisteredOwner
                                                                                    • API String ID: 3535843008-1113070880
                                                                                    • Opcode ID: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
                                                                                    • Instruction ID: 97ba07fcc0924f8d698b93a4c32f8f7a3ceb81663af41ec066a5e596666b9838
                                                                                    • Opcode Fuzzy Hash: fe32ea5757c181cea0fad4739291adb7fe5cb56e5df920aee23c3361bee12acf
                                                                                    • Instruction Fuzzy Hash: F5F09060700204ABEB00D6A8ACD2BAA3769D750304F60907FA1058F382C679EE019B5C
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475271
                                                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00475483), ref: 00475288
                                                                                      • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateErrorFileHandleLast
                                                                                    • String ID: CreateFile
                                                                                    • API String ID: 2528220319-823142352
                                                                                    • Opcode ID: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
                                                                                    • Instruction ID: b0794b45f16520e4762b2717541816a935241bfc2e667b83be7f23d95be3de9d
                                                                                    • Opcode Fuzzy Hash: 2c7b4fae504844472e6a07c4f0bcfda842c0d735d71c8af9ff6e211e096a353b
                                                                                    • Instruction Fuzzy Hash: 99E06D702403447FEA10FA69CCC6F4A77989B04728F10C152BA48AF3E3C5B9FC808A58
                                                                                    APIs
                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Open
                                                                                    • String ID: System\CurrentControlSet\Control\Windows$;H
                                                                                    • API String ID: 71445658-2565060666
                                                                                    • Opcode ID: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                                                                                    • Instruction ID: 60e43675bb36a9eef4a15598a1848ca3f705ecc445ee8c9fe52fc6b05f1352bb
                                                                                    • Opcode Fuzzy Hash: a11f376e1d034aeb0d9ae53f60934921bcd728bb93d306f1768079d63b1ffdfe
                                                                                    • Instruction Fuzzy Hash: 29D09E72950128BB9B009A89DC41DFB775DDB15760F45441BF9049B141C5B4AC5197E4
                                                                                    APIs
                                                                                      • Part of subcall function 00457044: CoInitialize.OLE32(00000000), ref: 0045704A
                                                                                      • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                      • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                    • GetProcAddress.KERNEL32(00000000,SHCreateItemFromParsingName), ref: 004570D8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressErrorInitializeLibraryLoadModeProc
                                                                                    • String ID: SHCreateItemFromParsingName$shell32.dll
                                                                                    • API String ID: 2906209438-2320870614
                                                                                    • Opcode ID: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
                                                                                    • Instruction ID: 7fba65882f7194314ab185764ebfac318737a269d5660949bdaf7135ffc1064c
                                                                                    • Opcode Fuzzy Hash: 9d30f7af3022304e39d9007edb753d7b8512de14ad0f58a0e87bb64db50414c6
                                                                                    • Instruction Fuzzy Hash: ECC08CA074860093CB40B3FA344320E1841AB8071FB10C07F7A04A66C7DE3C88088B2E
                                                                                    APIs
                                                                                      • Part of subcall function 0042E394: SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                      • Part of subcall function 0042E394: LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                    • GetProcAddress.KERNEL32(00000000,SHPathPrepareForWriteA), ref: 0046CE05
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressErrorLibraryLoadModeProc
                                                                                    • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                    • API String ID: 2492108670-2683653824
                                                                                    • Opcode ID: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
                                                                                    • Instruction ID: c0603f0a452a360a01ce82207306765f02b8a986224f2e77b24b084cc810d505
                                                                                    • Opcode Fuzzy Hash: 4f35c33f472421c4948a2ce6cac4f72f28d005e98571f32e7a9733a845a9f857
                                                                                    • Instruction Fuzzy Hash: 44B092A060074086DB40B7A298D262B28269740319B20843BB0CC9BA95EB3E88240B9F
                                                                                    APIs
                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000008,?,?,00000000,00448709), ref: 0044864C
                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004486CD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressLibraryLoadProc
                                                                                    • String ID:
                                                                                    • API String ID: 2574300362-0
                                                                                    • Opcode ID: 36521cdfc13aba0ae9c44214f12a2e14552a0dd36018004eb1372d311063bccb
                                                                                    • Instruction ID: 2eaa58f6359003fef9dee836e3db1fa56ae38c906bc4f4c4d93ca6671f7cd4fb
                                                                                    • Opcode Fuzzy Hash: 36521cdfc13aba0ae9c44214f12a2e14552a0dd36018004eb1372d311063bccb
                                                                                    • Instruction Fuzzy Hash: 14515470E00105AFDB40EF95C491AAEBBF9EB45319F11817FE414BB391DA389E05CB99
                                                                                    APIs
                                                                                    • GetSystemMenu.USER32(00000000,00000000,00000000,00481DB4), ref: 00481D4C
                                                                                    • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 00481D5D
                                                                                    • AppendMenuA.USER32(00000000,00000000,0000270F,00000000), ref: 00481D75
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Append$System
                                                                                    • String ID:
                                                                                    • API String ID: 1489644407-0
                                                                                    • Opcode ID: 672145a2bbc7660003845448dd8fd579fca208d3c81716cd1fbd69936c4767aa
                                                                                    • Instruction ID: 44f8b16540ed1c6eecf525242fd074403e334eda66194076213ef08da8c10300
                                                                                    • Opcode Fuzzy Hash: 672145a2bbc7660003845448dd8fd579fca208d3c81716cd1fbd69936c4767aa
                                                                                    • Instruction Fuzzy Hash: 3431D4307043441AD721FB769C82BAE3A989F15318F54483FF901AB2E3CA7CAD09879D
                                                                                    APIs
                                                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00424412
                                                                                    • TranslateMessage.USER32(?), ref: 0042448F
                                                                                    • DispatchMessageA.USER32(?), ref: 00424499
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$DispatchPeekTranslate
                                                                                    • String ID:
                                                                                    • API String ID: 4217535847-0
                                                                                    • Opcode ID: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                    • Instruction ID: 8eae6dca0d2455523dd27ca57e4683f6da326f6f2f90499d04ddbfd693f83f9d
                                                                                    • Opcode Fuzzy Hash: d4f7142ddfb2041a0388c754ad29f8297397d1c5d5a6fc901d04af05902ad934
                                                                                    • Instruction Fuzzy Hash: E3116D303043205AEB20FA24A941B9F73D4DFC5758F80481EFC99972C2D77D9D49879A
                                                                                    APIs
                                                                                    • SetPropA.USER32(00000000,00000000), ref: 0041666A
                                                                                    • SetPropA.USER32(00000000,00000000), ref: 0041667F
                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,00000000,00000000,?,00000000,00000000), ref: 004166A6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Prop$Window
                                                                                    • String ID:
                                                                                    • API String ID: 3363284559-0
                                                                                    • Opcode ID: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
                                                                                    • Instruction ID: 6913c5f2d07602d921388148e43cadd8ab2d6729f30613f48e4cae6714e3bc13
                                                                                    • Opcode Fuzzy Hash: 953367bc10487f5f00132df45b9f4bdc07709d3a3f88142737615a1cc8063318
                                                                                    • Instruction Fuzzy Hash: ACF01271701210ABDB10AB599C85FA732DCAB09714F16057AB905EF286C778DC40C7A8
                                                                                    APIs
                                                                                    • IsWindowVisible.USER32(?), ref: 0041EE64
                                                                                    • IsWindowEnabled.USER32(?), ref: 0041EE6E
                                                                                    • EnableWindow.USER32(?,00000000), ref: 0041EE94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$EnableEnabledVisible
                                                                                    • String ID:
                                                                                    • API String ID: 3234591441-0
                                                                                    • Opcode ID: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                                                                                    • Instruction ID: 3b4cb379701a2ac24b7d0c87bf9454d2e26b3d0fb89a85d5a5a22e513a73856b
                                                                                    • Opcode Fuzzy Hash: 495d6a49dc4b54b7e424eeae3cce025a94256eba33976185de8149e812397146
                                                                                    • Instruction Fuzzy Hash: EAE06DB5100301AAE301AB2BDC81B5B7A9CAB54350F05843BA9089B292D63ADC408B7C
                                                                                    APIs
                                                                                    • SetActiveWindow.USER32(?), ref: 0046A02D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ActiveWindow
                                                                                    • String ID: PrepareToInstall
                                                                                    • API String ID: 2558294473-1101760603
                                                                                    • Opcode ID: bd917288eaa5b05b1195b505efe9116c2b5c78d32a5283306b423edfa0bdd6d5
                                                                                    • Instruction ID: c614f106b7f0b4f176116dff63491c2ec041d81708a05a15fd0d1780f22877a3
                                                                                    • Opcode Fuzzy Hash: bd917288eaa5b05b1195b505efe9116c2b5c78d32a5283306b423edfa0bdd6d5
                                                                                    • Instruction Fuzzy Hash: 97A14934A00109DFCB00EF99D986EDEB7F5AF48304F5540B6E404AB362D738AE45CB9A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: /:*?"<>|
                                                                                    • API String ID: 0-4078764451
                                                                                    • Opcode ID: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
                                                                                    • Instruction ID: 6c3526c54916fe71946563460b5bd12015a165326d65a32731909bc5939f884d
                                                                                    • Opcode Fuzzy Hash: e5c60157bcf2278da473a52dbfa3e40327efacf8e8b2ac4b78b74c9d89147c88
                                                                                    • Instruction Fuzzy Hash: CF71C370A40215BADB10E766DCD2FEE7BA19F05308F148067F580BB292E779AD458B4E
                                                                                    APIs
                                                                                    • SetActiveWindow.USER32(?), ref: 00482676
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ActiveWindow
                                                                                    • String ID: InitializeWizard
                                                                                    • API String ID: 2558294473-2356795471
                                                                                    • Opcode ID: 3626624f3147e861467950174f06d96ecabfee41a1c9b8d7b2440425271d24be
                                                                                    • Instruction ID: 0fabbc08dbff6a0894d12042e1c617afa12541eacf44f0b659f2bb150b55c2ae
                                                                                    • Opcode Fuzzy Hash: 3626624f3147e861467950174f06d96ecabfee41a1c9b8d7b2440425271d24be
                                                                                    • Instruction Fuzzy Hash: 8311C130204200AFD700EB69EED6B1A37E4E764328F60057BE404D72A1EA796C41CB5E
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047C740,00000000,0047C942), ref: 0047C539
                                                                                    Strings
                                                                                    • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047C509
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpen
                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion
                                                                                    • API String ID: 47109696-1019749484
                                                                                    • Opcode ID: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
                                                                                    • Instruction ID: acdf9366f140fa0c09696ff4b806567a5b27613a006b44f2785fa8682630d216
                                                                                    • Opcode Fuzzy Hash: 058bbab7ea9ec86a0dd33160b35f36364f977485e0abef3b7f9f2bc760079b92
                                                                                    • Instruction Fuzzy Hash: 6CF0823170052477DA00A65E6C82B9FA79D8B84758F60403FF508DB242EABAEE0243EC
                                                                                    APIs
                                                                                    • RegSetValueExA.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,0047620E,?,0049C1E0,?,0046F15B,?,00000000,0046F6F6,?,_is1), ref: 0046EE67
                                                                                    Strings
                                                                                    • Inno Setup: Setup Version, xrefs: 0046EE65
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value
                                                                                    • String ID: Inno Setup: Setup Version
                                                                                    • API String ID: 3702945584-4166306022
                                                                                    • Opcode ID: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
                                                                                    • Instruction ID: 37dbbd71146fd60ed96ba35b84ff74d599aeccd68d0f9eb37ee109455dfe34ad
                                                                                    • Opcode Fuzzy Hash: 80676ca53bf8d59feef104d4bc7cb567c816a54b460bafb4a4ed583678a3f251
                                                                                    • Instruction Fuzzy Hash: B1E06D753012043FE710AA2B9C85F5BBADCDF88365F10403AB908DB392D578DD0181A9
                                                                                    APIs
                                                                                    • RegSetValueExA.ADVAPI32(?,NoModify,00000000,00000004,00000000,00000004,00000001,?,0046F532,?,?,00000000,0046F6F6,?,_is1,?), ref: 0046EEC7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value
                                                                                    • String ID: NoModify
                                                                                    • API String ID: 3702945584-1699962838
                                                                                    • Opcode ID: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
                                                                                    • Instruction ID: 84621f748531697c6bb4a8e0450a59e651a2caf9945441e4ffcb8bd5fa838dfd
                                                                                    • Opcode Fuzzy Hash: f40bfeae81701b53243146576d0ffb0e6a468f93b3df03c8cd4f9f1e738a44cb
                                                                                    • Instruction Fuzzy Hash: F6E04FB4640308BFEB04DB55CD4AF6B77ECDB48714F10405ABA049B281E674FE00C669
                                                                                    APIs
                                                                                    • GetACP.KERNEL32(?,?,00000001,00000000,0047E753,?,-0000001A,00480609,-00000010,?,00000004,0000001B,00000000,00480956,?,0045DB68), ref: 0047E4EA
                                                                                      • Part of subcall function 0042E31C: GetDC.USER32(00000000), ref: 0042E32B
                                                                                      • Part of subcall function 0042E31C: EnumFontsA.GDI32(?,00000000,0042E308,00000000,00000000,0042E374,?,00000000,00000000,004809BD,?,?,00000001,00000000,00000002,00000000), ref: 0042E356
                                                                                      • Part of subcall function 0042E31C: ReleaseDC.USER32(00000000,?), ref: 0042E36E
                                                                                    • SendNotifyMessageA.USER32(00020436,00000496,00002711,-00000001), ref: 0047E6BA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: EnumFontsMessageNotifyReleaseSend
                                                                                    • String ID:
                                                                                    • API String ID: 2649214853-0
                                                                                    • Opcode ID: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
                                                                                    • Instruction ID: a62c935d52da393e7312112ce75ddb0898731394ffd2a16b1d4fc3e518f8127d
                                                                                    • Opcode Fuzzy Hash: 7f479caed6d506e1fedd37a3e9b8fbc918d7d672324c4412b746d2e8a14c4527
                                                                                    • Instruction Fuzzy Hash: 5B5195746001049BC710FF67E98169A37E5EB58308B90C67BA8049B3A6DB3CED45CB9D
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,0047DF83,?,?,?,?,00000000,00000000,00000000,00000000), ref: 0047DF3D
                                                                                      • Part of subcall function 0042CA00: GetSystemMetrics.USER32(0000002A), ref: 0042CA12
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMetricsMultiSystemWide
                                                                                    • String ID: /G
                                                                                    • API String ID: 224039744-2088674125
                                                                                    • Opcode ID: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
                                                                                    • Instruction ID: 84c81a41a939c89cd5cf89585cf0d961f9543ff151f38a86aad590f5673b43e0
                                                                                    • Opcode Fuzzy Hash: 9f8ad520ff63b3f089cafa147e7d8bbd1691bb3a433f158030b0d1014876a4d7
                                                                                    • Instruction Fuzzy Hash: 53518070A04215AFDB21DF55D8C4FAA7BB8EF64318F118077E404AB3A1C778AE45CB99
                                                                                    APIs
                                                                                    • RegEnumKeyExA.ADVAPI32(?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DF6C
                                                                                    • RegCloseKey.ADVAPI32(?,0042DFDD,?,00000000,00000000,00000000,00000000,00000000,0042DFD6,?,?,00000008,00000000,00000000,0042E003), ref: 0042DFD0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseEnum
                                                                                    • String ID:
                                                                                    • API String ID: 2818636725-0
                                                                                    • Opcode ID: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
                                                                                    • Instruction ID: d62689c7b7995b9893119ef97773413105dd68debc8ff02f2d4f9d8a28cc91ff
                                                                                    • Opcode Fuzzy Hash: 54e2847b2ed8cbec0c232d6556bf46b22f1e93997a90c035dd6b8310f6c19c74
                                                                                    • Instruction Fuzzy Hash: DD31B270F04258AEDB11DFA6DD42BAEBBB9EB49304F91407BE501E6280D6785E01CA2D
                                                                                    APIs
                                                                                      • Part of subcall function 00495508: GetDC.USER32(00000000), ref: 00495519
                                                                                      • Part of subcall function 00495508: SelectObject.GDI32(00000000,00000000), ref: 0049553B
                                                                                      • Part of subcall function 00495508: GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,00495AB9), ref: 0049554F
                                                                                      • Part of subcall function 00495508: GetTextMetricsA.GDI32(00000000,?), ref: 00495571
                                                                                      • Part of subcall function 00495508: ReleaseDC.USER32(00000000,00000000), ref: 0049558E
                                                                                    • MulDiv.KERNEL32(?,?,00000006), ref: 00495AFB
                                                                                    • MulDiv.KERNEL32(?,?,0000000D), ref: 00495B10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Text$ExtentMetricsObjectPointReleaseSelect
                                                                                    • String ID:
                                                                                    • API String ID: 844173074-0
                                                                                    • Opcode ID: 0ae29da0906a83ea8dd71af8a3b995980c0d8de00cfc8428832f083f9a8e0037
                                                                                    • Instruction ID: abe69acf9078cd54ec5aa8dad2b6463f40ee800cf76dae291ad797c0d2ca63cb
                                                                                    • Opcode Fuzzy Hash: 0ae29da0906a83ea8dd71af8a3b995980c0d8de00cfc8428832f083f9a8e0037
                                                                                    • Instruction Fuzzy Hash: FC21D6713012009FDB50DF69C8C5AA637E9EB89314F6446B9FD08CF29ADB35EC058B65
                                                                                    APIs
                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 0045283C
                                                                                    • GetLastError.KERNEL32(00000000,00000000,?,?,00458278,00000000,00458260,?,?,?,00000000,00452862,?,?,?,00000001), ref: 00452844
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateErrorLastProcess
                                                                                    • String ID:
                                                                                    • API String ID: 2919029540-0
                                                                                    • Opcode ID: 32d7980bd8ec2bee900e92c865b72ef71cfaa45d55aa0c85c0401d49ed696f28
                                                                                    • Instruction ID: fcc055d8c1a696a2a0db1e32a085008d871673fec5534948229a16d4440eefa6
                                                                                    • Opcode Fuzzy Hash: 32d7980bd8ec2bee900e92c865b72ef71cfaa45d55aa0c85c0401d49ed696f28
                                                                                    • Instruction Fuzzy Hash: A2113C72600208AF8B40DEA9DD41D9F77ECEB4E310B114567FD18D3241D678EE148B68
                                                                                    APIs
                                                                                    • FindResourceA.KERNEL32(00400000,00000000,0000000A), ref: 0040ADF2
                                                                                    • FreeResource.KERNEL32(00000000,00400000,00000000,0000000A,F0E80040,00000000,?,?,0040AF4F,00000000,0040AF67,?,?,?,00000000), ref: 0040AE03
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$FindFree
                                                                                    • String ID:
                                                                                    • API String ID: 4097029671-0
                                                                                    • Opcode ID: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
                                                                                    • Instruction ID: 3d7a77417cef7b3885e8747e4544195f2de945da78ee84bb1155330bb8f828e3
                                                                                    • Opcode Fuzzy Hash: 07387713778517d694c210176a4718dd0562bb365b6db4bb8115bda04798bcb6
                                                                                    • Instruction Fuzzy Hash: 0301F771300700AFD700FF69EC52E1B77EDDB46714710807AF500AB3D1D639AC10966A
                                                                                    APIs
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                    • EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$CurrentEnumWindows
                                                                                    • String ID:
                                                                                    • API String ID: 2396873506-0
                                                                                    • Opcode ID: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                                                                                    • Instruction ID: bcaa23655132f8f2785c0a842f21b48ac99b37e3223c43442b01e3940dbd0cdf
                                                                                    • Opcode Fuzzy Hash: 30aad164e0a195eeb96462141dc827bf49acbc8680001675c00c89b7ac155170
                                                                                    • Instruction Fuzzy Hash: 31015B76A04604BFD706CF6BEC1199ABBE8E789720B22887BEC04D3690E7355C10DF18
                                                                                    APIs
                                                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 00452CC2
                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00452CE8), ref: 00452CCA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLastMove
                                                                                    • String ID:
                                                                                    • API String ID: 55378915-0
                                                                                    • Opcode ID: 92f277caa9c3c56662d1ce6f28aaa0531c95695199337b3952b9b7b9e7465d28
                                                                                    • Instruction ID: 1f9035ddd188b097fe3d15476f32cd7793c58c8f4df07880d9fc6ba60e4ff235
                                                                                    • Opcode Fuzzy Hash: 92f277caa9c3c56662d1ce6f28aaa0531c95695199337b3952b9b7b9e7465d28
                                                                                    • Instruction Fuzzy Hash: 9401D671A04208AB8712EB799D4149EB7ECEB8A32575045BBFC04E3243EA785E048558
                                                                                    APIs
                                                                                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527A9
                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,004527CF), ref: 004527B1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1375471231-0
                                                                                    • Opcode ID: 855e2e178366579e8cdbc9f044a0346376c594dce53ca60ac40061c8de66a150
                                                                                    • Instruction ID: e3b373b60118a844676bb749001e6832c3b26a50706decb61b3ae2e0e224b701
                                                                                    • Opcode Fuzzy Hash: 855e2e178366579e8cdbc9f044a0346376c594dce53ca60ac40061c8de66a150
                                                                                    • Instruction Fuzzy Hash: 40F02871A00308BBCB01EF759D4259EB7E8EB4E311B2045B7FC04E3642E6B94E04859C
                                                                                    APIs
                                                                                    • LoadCursorA.USER32(00000000,00007F00), ref: 00423249
                                                                                    • LoadCursorA.USER32(00000000,00000000), ref: 00423273
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CursorLoad
                                                                                    • String ID:
                                                                                    • API String ID: 3238433803-0
                                                                                    • Opcode ID: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                                                                                    • Instruction ID: 5e34cf6406f075c2c63d733b1f02ef4b9a88184ee1572dc0f3c8875cc615d59b
                                                                                    • Opcode Fuzzy Hash: 0c9a104e89a33193f60416200903d3bd70bbd31149720632682593485f60625b
                                                                                    • Instruction Fuzzy Hash: 9EF0A711B04254AADA109E7E6CC0D6B72A8DF82735B61037BFA3EC72D1C62E1D414569
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00008000), ref: 0042E39E
                                                                                    • LoadLibraryA.KERNEL32(00000000,00000000,0042E3E8,?,00000000,0042E406,?,00008000), ref: 0042E3CD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLibraryLoadMode
                                                                                    • String ID:
                                                                                    • API String ID: 2987862817-0
                                                                                    • Opcode ID: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                                                                                    • Instruction ID: 14c2566281f292fbf4bc3f3871eddb8f7eb4f11f4d1149329263d7d1c8790498
                                                                                    • Opcode Fuzzy Hash: 4bb5710dc3172506f3a82e57bec548632d1945d06b3d92e94bd16d63dfaa8550
                                                                                    • Instruction Fuzzy Hash: 02F08970B147447FDB119F779CA241BBBECDB49B1175249B6F800A3591E53C4910C928
                                                                                    APIs
                                                                                    • GetClassInfoA.USER32(00400000,?,?), ref: 004162E1
                                                                                    • GetClassInfoA.USER32(00000000,?,?), ref: 004162F1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassInfo
                                                                                    • String ID:
                                                                                    • API String ID: 3534257612-0
                                                                                    • Opcode ID: 1299c1a0664136db271893dd0cc50e967199de2eea8caf0295a053f4b6d41932
                                                                                    • Instruction ID: 8e3ee469ef83f81d8c71ae4630d2e8c7c449d5c480d74fd2e2a5eda3e874073d
                                                                                    • Opcode Fuzzy Hash: 1299c1a0664136db271893dd0cc50e967199de2eea8caf0295a053f4b6d41932
                                                                                    • Instruction Fuzzy Hash: BDE012B26015155ED710DBA89D81EE736DCDB08350B210177BE08CA256D364DD008BA8
                                                                                    APIs
                                                                                    • SHGetKnownFolderPath.SHELL32(00499D40,00008000,00000000,?), ref: 0047C89B
                                                                                    • CoTaskMemFree.OLE32(?,0047C8DE), ref: 0047C8D1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FolderFreeKnownPathTask
                                                                                    • String ID: COMMAND.COM$Common Files$CommonFilesDir$Failed to get path of 64-bit Common Files directory$Failed to get path of 64-bit Program Files directory$ProgramFilesDir$SystemDrive$\Program Files$cmd.exe
                                                                                    • API String ID: 969438705-544719455
                                                                                    • Opcode ID: c380859d91d2530b1710b7ab5da91f48806622674321ef44444f1ad2bc0d7433
                                                                                    • Instruction ID: f48ec61de784b6bea0373c7a91bc006da4a0813e938d35ae17fa89473a65de5f
                                                                                    • Opcode Fuzzy Hash: c380859d91d2530b1710b7ab5da91f48806622674321ef44444f1ad2bc0d7433
                                                                                    • Instruction Fuzzy Hash: 22E09230340604BFEB15EB61DC92F6977A8EB48B01B72847BF504E2680D67CAD00DB1C
                                                                                    APIs
                                                                                    • SetFilePointer.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 0045090E
                                                                                    • GetLastError.KERNEL32(?,00000000,?,00000002,?,?,00470149,?,00000000), ref: 00450916
                                                                                      • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$FilePointer
                                                                                    • String ID:
                                                                                    • API String ID: 1156039329-0
                                                                                    • Opcode ID: ec46a7bc9e5a7a34518fa7989fb6988307d7ef9dfce9dbcd61575ad1106d4b51
                                                                                    • Instruction ID: 32d43412562f4d6ab64aa8be608e77008e370c57458e4df53f7444e76f76d0cb
                                                                                    • Opcode Fuzzy Hash: ec46a7bc9e5a7a34518fa7989fb6988307d7ef9dfce9dbcd61575ad1106d4b51
                                                                                    • Instruction Fuzzy Hash: 0EE012E93042015BF700EA6599C1B2F22DCDB44315F00446ABD44CA28BE678CC048B29
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$AllocFree
                                                                                    • String ID:
                                                                                    • API String ID: 2087232378-0
                                                                                    • Opcode ID: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                                    • Instruction ID: 119661fe7174a079321c86e78af40791ac039b5eb8373b45468023a5ba433726
                                                                                    • Opcode Fuzzy Hash: 94577317c2bcd4d3a70d22c0b2f2fc78c72c60cff144ef5375d29febf27e2799
                                                                                    • Instruction Fuzzy Hash: F7F08272A0063067EB60596A4C81B5359859BC5B94F154076FD09FF3E9D6B58C0142A9
                                                                                    APIs
                                                                                    • GetSystemDefaultLCID.KERNEL32(00000000,00408712), ref: 004085FB
                                                                                      • Part of subcall function 00406DEC: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406E09
                                                                                      • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: DefaultInfoLoadLocaleStringSystem
                                                                                    • String ID:
                                                                                    • API String ID: 1658689577-0
                                                                                    • Opcode ID: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                                                                                    • Instruction ID: 9026c6f0acc6bf601755118861b832b1e3c4c92574a9a05948c89544872af2a3
                                                                                    • Opcode Fuzzy Hash: 92125e52594e5bc8ee6d97e09480d95589045c4468e862feaba19903f63d3f1d
                                                                                    • Instruction Fuzzy Hash: 47314E35E00109ABCB00EB55CC819EEB779EF84314F558577E815BB286EB38AA018B98
                                                                                    APIs
                                                                                    • SetScrollInfo.USER32(00000000,?,?,00000001), ref: 0041FC39
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoScroll
                                                                                    • String ID:
                                                                                    • API String ID: 629608716-0
                                                                                    • Opcode ID: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                    • Instruction ID: 6365c2cd079840e4170b7c9ce409c3d873e807bce8729d2e10e5c00059922083
                                                                                    • Opcode Fuzzy Hash: a0ce2aaa01497ac04468ea6ac7a83421c49688bcbeeff2d3e991700215f3b25f
                                                                                    • Instruction Fuzzy Hash: D8214FB1608746AFC351DF3984407A6BBE4BB48344F14893EE498C3741E778E99ACBD6
                                                                                    APIs
                                                                                      • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                      • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                    • SHPathPrepareForWriteA.SHELL32(00000000,00000000,00000000,00000000,00000000,0046C4AE,?,00000000,?,?,0046C6C0,?,00000000,0046C734), ref: 0046C492
                                                                                      • Part of subcall function 0041EF58: IsWindow.USER32(?), ref: 0041EF66
                                                                                      • Part of subcall function 0041EF58: EnableWindow.USER32(?,00000001), ref: 0041EF75
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ThreadWindow$CurrentEnableEnumPathPrepareWindowsWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3319771486-0
                                                                                    • Opcode ID: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
                                                                                    • Instruction ID: eef1953176fed27c4f60a3b97998f4e8fb1447464a393d6256780c84e8a913cd
                                                                                    • Opcode Fuzzy Hash: 0af19ab3550c8734ef4e1cf2f84aef4c41dad365f35295dd8d2c2646a272cfa9
                                                                                    • Instruction Fuzzy Hash: 5AF0B471248300BFE705DF62ECA6B35B6E8D748714F61047BF40886590E97D5844D51E
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3934441357-0
                                                                                    • Opcode ID: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                    • Instruction ID: 51b66c86ab1fb2ed9abdb0db83839a26410808368eb32e0cb4295e2ee82716ff
                                                                                    • Opcode Fuzzy Hash: d61e7892e696cd19dbec5936e1f60c0eb1c4f94c101f5f53d8ed807e2bb541d1
                                                                                    • Instruction Fuzzy Hash: 09F04970608109EBBB1CCF58D0618AF7BA0EB48300F2080AFE907C7BA0D634AA80D658
                                                                                    APIs
                                                                                    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,00000000,00400000,?), ref: 00416585
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateWindow
                                                                                    • String ID:
                                                                                    • API String ID: 716092398-0
                                                                                    • Opcode ID: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                                    • Instruction ID: 158b8484bb218b41c698b3aa21f26e2dd86497bc01e640ef524e7c8f4c0ee3c6
                                                                                    • Opcode Fuzzy Hash: b152e844846ae8a52721441d180559fdf16f7956a15d86c9ff4cf0dcda8b9698
                                                                                    • Instruction Fuzzy Hash: 4BF019B2200510AFDB84DE9CD9C0F9773ECEB0C210B0481A6FA08CB21AD220EC108BB0
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004149EF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                    • Instruction ID: 59ac3629b8f45f7a6bca1b57e2bf54285868c68ba6336e642f1ef9b7bb8d2b05
                                                                                    • Opcode Fuzzy Hash: 9e73aedc2ede48524128b4fba7c94cddd86b5e43f4b9cee2e76a3e9f018a4363
                                                                                    • Instruction Fuzzy Hash: B2F0DA762042019FC740DF6CC8C488A77E5FF89255B5546A9F989CB356C731EC54CB91
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00450804
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                                                                                    • Instruction ID: 52eb814c7c241dc182afdc6c3e242d4e4c9a4e6d94000e289351c80ae23ff87c
                                                                                    • Opcode Fuzzy Hash: ce99838f7be0491c6923214398908b2fd93372403a84c7b432a549debe4dc153
                                                                                    • Instruction Fuzzy Hash: 53E012B53541483EE780EEAD6C42F9777DC971A714F008037B998D7341D461DD158BA8
                                                                                    APIs
                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,0042CD14,?,00000001,?,?,00000000,?,0042CD66,00000000,00452A25,00000000,00452A46,?,00000000), ref: 0042CCF7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 2e3447488e8940f063bbcfc4a9008e9bc81ad59ac090e4e62a8f5aa92ecca264
                                                                                    • Instruction ID: d3c11148bbbe1678040d416a6bc301cfea82702c80b798926358c5e84281cc0e
                                                                                    • Opcode Fuzzy Hash: 2e3447488e8940f063bbcfc4a9008e9bc81ad59ac090e4e62a8f5aa92ecca264
                                                                                    • Instruction Fuzzy Hash: 80E065B1304304BFD701EB66EC92A5EBAACDB49754BA14876B50097592D5B86E008468
                                                                                    APIs
                                                                                    • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FormatMessage
                                                                                    • String ID:
                                                                                    • API String ID: 1306739567-0
                                                                                    • Opcode ID: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                                                                                    • Instruction ID: fbc307da5c1359fbfbc351051067b699ae1438aedf6613c80dda169529e76e7e
                                                                                    • Opcode Fuzzy Hash: 07eb917982e44065cc90d67cadef310e262c4caec6bcfbb1197f6d5f5d2cfc19
                                                                                    • Instruction Fuzzy Hash: BCE0206278431116F2353416AC47B77150E43C0708F944027BB90DF3D3D6AF9945D25E
                                                                                    APIs
                                                                                    • GetTextExtentPointA.GDI32(?,00000000,00000000), ref: 0041AF9B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExtentPointText
                                                                                    • String ID:
                                                                                    • API String ID: 566491939-0
                                                                                    • Opcode ID: fe3873e992a20e622ffaf78f93863b288a9be0a8311253c2d6346deae250c6a6
                                                                                    • Instruction ID: 6b43be1268843882f9474f888990ee0a0f71ddbfb678ee1088bae751a0726d8f
                                                                                    • Opcode Fuzzy Hash: fe3873e992a20e622ffaf78f93863b288a9be0a8311253c2d6346deae250c6a6
                                                                                    • Instruction Fuzzy Hash: E3E086F13097102BD600E67E1DC19DB77DC8A483697148177F458E7392D62DDE1A43AE
                                                                                    APIs
                                                                                    • CreateWindowExA.USER32(00000000,0042367C,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00406311
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateWindow
                                                                                    • String ID:
                                                                                    • API String ID: 716092398-0
                                                                                    • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                    • Instruction ID: 53e57476791a39574122dfc8a3f58f2f78c4a621b5a82e38d1c80b15216a1e52
                                                                                    • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                                                                    • Instruction Fuzzy Hash: EEE0FEB2214209BBDB00DE8ADCC1DABB7ACFB4C654F808105BB1C972428275AC608B71
                                                                                    APIs
                                                                                    • RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                                                                                    • Instruction ID: 68673b5cf84413dff1d7ecec16939cb2303f89f305828e6cd22260af4b89741b
                                                                                    • Opcode Fuzzy Hash: 296f4a6b1841180fcb6525c1425398a2afe0618770c3240f8adf4a5c8222c494
                                                                                    • Instruction Fuzzy Hash: EDE07EB2610119AF9B40DE8CDC81EEB37ADAB1D350F404016FA08E7200C2B4EC519BB4
                                                                                    APIs
                                                                                    • FindClose.KERNEL32(00000000,000000FF,0047096C,00000000,00471782,?,00000000,004717CB,?,00000000,00471904,?,00000000,?,00000000), ref: 00454C0E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseFind
                                                                                    • String ID:
                                                                                    • API String ID: 1863332320-0
                                                                                    • Opcode ID: 6665614e34a0f7cff573ca1669b2a109aa27f3c0ddffd1931b228eca5c2d9aab
                                                                                    • Instruction ID: 5c2dbd3a099336849a47a332199978da45cb785deb8a29a76394180ab3bc5383
                                                                                    • Opcode Fuzzy Hash: 6665614e34a0f7cff573ca1669b2a109aa27f3c0ddffd1931b228eca5c2d9aab
                                                                                    • Instruction Fuzzy Hash: A1E09BB09097004BC715DF39858031A76D19FC9325F05C96AEC99CF3D7E77D84454617
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(004959E6,?,00495A08,?,?,00000000,004959E6,?,?), ref: 0041469B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                    • Instruction ID: 3a83c41fa5c3d176b15f2666d2672a78f9af76d4247255e2ff0bda4df6ea0631
                                                                                    • Opcode Fuzzy Hash: 6e76042b9040d81ea616cca6ecacd77bc76811df147480a1eef497ac36b7c045
                                                                                    • Instruction Fuzzy Hash: 59E012723001199F8250CE5EDC88C57FBEDEBC966130983A6F508C7306DA31EC44C7A0
                                                                                    APIs
                                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406F24
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3934441357-0
                                                                                    • Opcode ID: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                                                                                    • Instruction ID: adeaf4ebd0e6cd94d64be6b3cb299443ba394f13a0b1cd3d8337db6b6af80796
                                                                                    • Opcode Fuzzy Hash: 4c02731fe18b0a47ab7745946c5e8dd4c7dfafdb2aa22804bebcbb41d9412fbb
                                                                                    • Instruction Fuzzy Hash: 53D012722091506AD220965A6C44EAB6BDCCBC5770F11063AB558C2181D7209C01C675
                                                                                    APIs
                                                                                      • Part of subcall function 004235F8: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042360D
                                                                                    • ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                      • Part of subcall function 00423628: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 00423644
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoParametersSystem$ShowWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3202724764-0
                                                                                    • Opcode ID: 749b279e1c5e0ab7b3e77853442b745bf30ea7cb0c28c018a636783dda1148f2
                                                                                    • Instruction ID: 3e39ddd90fb628193caaea160b6f4ed5bf244f394cc2da11a07db6b12dca8b82
                                                                                    • Opcode Fuzzy Hash: 749b279e1c5e0ab7b3e77853442b745bf30ea7cb0c28c018a636783dda1148f2
                                                                                    • Instruction Fuzzy Hash: 34D05E123821703142307ABB280699B46EC8D822EB389043BB5449B312ED5DCE01116C
                                                                                    APIs
                                                                                    • SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: TextWindow
                                                                                    • String ID:
                                                                                    • API String ID: 530164218-0
                                                                                    • Opcode ID: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                                                                                    • Instruction ID: e359d8c046b4275bb87a72ac3440150ee0889cd0e7de0465f76ccf46c1161c2e
                                                                                    • Opcode Fuzzy Hash: 968e2600307bd84f4d65718215a4df57ccfa9b7919b98356d7a542cd4e907fd2
                                                                                    • Instruction Fuzzy Hash: 81D05EE27011602BCB01BAED54C4AC667CC9B8D25AB1840BBF904EF257D638CE40C398
                                                                                    APIs
                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?,00000000,?,00467828,00000000,00000000,00000000,0000000C,00000000), ref: 00466B58
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CallbackDispatcherUser
                                                                                    • String ID:
                                                                                    • API String ID: 2492992576-0
                                                                                    • Opcode ID: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                    • Instruction ID: a3a9c25b9c80179eca176ae0059a0aa24e3542550d9dc9bac8dced773014ab2a
                                                                                    • Opcode Fuzzy Hash: 1170af52fdfa1b22d402febd08e71c9ecbcd6356f79449625b478cc807a9fefe
                                                                                    • Instruction Fuzzy Hash: 0ED09272210A109F8364CAADC9C4C97B3ECEF4C2213004659E54AC3B15D664FC018BA0
                                                                                    APIs
                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,004515CB,00000000), ref: 0042CD2F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesFile
                                                                                    • String ID:
                                                                                    • API String ID: 3188754299-0
                                                                                    • Opcode ID: 699a035a793c66476b33cfcb292e18e8433149420fa0246697406cd7a61acf8b
                                                                                    • Instruction ID: 53db4a1afaa3b7bebcc80daf879f764776582c58df104e6651e2d127eece83ed
                                                                                    • Opcode Fuzzy Hash: 699a035a793c66476b33cfcb292e18e8433149420fa0246697406cd7a61acf8b
                                                                                    • Instruction Fuzzy Hash: 48C08CE03222001A9E60A6BD2CC551F06CC891423A3A41E3BB129EB2E2D23D88162818
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A6D4,0040CC80,?,00000000,?), ref: 00406EDD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFile
                                                                                    • String ID:
                                                                                    • API String ID: 823142352-0
                                                                                    • Opcode ID: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                                                                                    • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                                                                    • Opcode Fuzzy Hash: d487f09bce5ab2446fefe52ff91139140134d323c8d44495a9ab4cbc0f9c4527
                                                                                    • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                                                                    APIs
                                                                                    • SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                      • Part of subcall function 004506B4: GetLastError.KERNEL32(004504D0,00450776,?,00000000,?,00497E2C,00000001,00000000,00000002,00000000,00497F8D,?,?,00000005,00000000,00497FC1), ref: 004506B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorFileLast
                                                                                    • String ID:
                                                                                    • API String ID: 734332943-0
                                                                                    • Opcode ID: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                                                                                    • Instruction ID: 9573b676cf6dd5fef234c73c81a1a5d02d78d5ca05287b50762f3c98dcfac2da
                                                                                    • Opcode Fuzzy Hash: dfd6122944db5b319254e7b77af95d7469dcf5406d44b15aeae4525e96e42585
                                                                                    • Instruction Fuzzy Hash: 1AC04CA5700211479F10A6BA85C1A0662D86A5D3157144066BD08CF207D668D8148A18
                                                                                    APIs
                                                                                    • SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CurrentDirectory
                                                                                    • String ID:
                                                                                    • API String ID: 1611563598-0
                                                                                    • Opcode ID: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                    • Instruction ID: 2ee9fcf0c2ecb8048618371478a38130c752a95b947e2a8aefd026f579ab26ad
                                                                                    • Opcode Fuzzy Hash: 9cfe1b671e2ded52e2a4f1899edd371c25323ab6eac1b77aed394817f5a1d109
                                                                                    • Instruction Fuzzy Hash: 33B012E03D120A2BCA0079FE4CC192A00CC46292163401B3B3006EB1C3D83DC8180824
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(?,0042E40D), ref: 0042E400
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorMode
                                                                                    • String ID:
                                                                                    • API String ID: 2340568224-0
                                                                                    • Opcode ID: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                                                                                    • Instruction ID: 426ac138898b17598b25982f2c454791bd479401c65f9a69ae9baa170422678e
                                                                                    • Opcode Fuzzy Hash: cb8e2ebd86b0ac1182f6c4657d989dfa6a466ad308997f4b3834ff3b1e7758f7
                                                                                    • Instruction Fuzzy Hash: CDB09B7670C6105EE709D6D5B45552D63D4D7C57207E14477F010D2581D57D58054E18
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: DestroyWindow
                                                                                    • String ID:
                                                                                    • API String ID: 3375834691-0
                                                                                    • Opcode ID: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                    • Instruction ID: 4f6e5339ba6c71e81ef5aec1f6829bfe42d3c8de95bc03762545e97b2cddf6f9
                                                                                    • Opcode Fuzzy Hash: 1244af60e57b01067fe56da529b9c4312cbd500fa9ed17bad69dff1823a021af
                                                                                    • Instruction Fuzzy Hash: 1AA00275501500AADA00E7B5D849F7E2298BB44204FD905F9714897056C57C99008B55
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2f87504b9b3c5ef8a424e08888e9b878f09f15df180bfdf00abd21092ab1bc52
                                                                                    • Instruction ID: 41a6872630840156d23f43a697f0b10540748f54e9aa1b8241e7bbe25a2b1888
                                                                                    • Opcode Fuzzy Hash: 2f87504b9b3c5ef8a424e08888e9b878f09f15df180bfdf00abd21092ab1bc52
                                                                                    • Instruction Fuzzy Hash: 73517574E002099FDB00EFA9C892AAFBBF5EB49314F50817AE500E7351DB389D41CB98
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041EDA4,?,0042388F,00423C0C,0041EDA4), ref: 0041F3E2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                                                                                    • Instruction ID: 3312bc658de40493dbbbdb628fa1ac862c14c743cb2aabe02eeb7d71ec829e14
                                                                                    • Opcode Fuzzy Hash: f624f178b2757757f6ee0ed82108e7e17b49aa81eb1cfd09d0e3ddd3732ee692
                                                                                    • Instruction Fuzzy Hash: D5115A752007059BCB20DF19D880B82FBE5EF98390F10C53BE9688B385D3B4E8458BA9
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,0045302D), ref: 0045300F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID:
                                                                                    • API String ID: 1452528299-0
                                                                                    • Opcode ID: 796ee09302341f2f0fe022b6b7ad64e2259239b3e6510a293da86372227c0e6a
                                                                                    • Instruction ID: b902f5f71593d0acd8113edc39c0d5725662cc955bae9521e0e34912f41e4d76
                                                                                    • Opcode Fuzzy Hash: 796ee09302341f2f0fe022b6b7ad64e2259239b3e6510a293da86372227c0e6a
                                                                                    • Instruction Fuzzy Hash: 850170356042486FC701DF699C008EEFBE8EB4D76171082B7FC24C3382D7345E059664
                                                                                    APIs
                                                                                    • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,00401973), ref: 00401766
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 1263568516-0
                                                                                    • Opcode ID: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                                    • Instruction ID: fd45504e6079eb3c344fd15592bdf3984e08e9418c18d248e8b2091ea2ac4f2a
                                                                                    • Opcode Fuzzy Hash: 3cb279d385dc81f8188aef87182d0a586e7f532f71175ddb5b892d42a5daf7f8
                                                                                    • Instruction Fuzzy Hash: A10120766443148FC3109F29EDC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                                                                    APIs
                                                                                    • LocalAlloc.KERNEL32(00000000,00000644,?,0049B450,004013A3,?,?,00401443,?,?,?,?,?,00401983), ref: 00401353
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocLocal
                                                                                    • String ID:
                                                                                    • API String ID: 3494564517-0
                                                                                    • Opcode ID: 833cffc3d4ae6fddf196a7017a3fa962a39b4640526386715143ff6d9bbaf8a6
                                                                                    • Instruction ID: 71c91fbc4c3ed8fd369fb1531a6952d3d9178ec9d6227f0a2e7a8dd8dab45303
                                                                                    • Opcode Fuzzy Hash: 833cffc3d4ae6fddf196a7017a3fa962a39b4640526386715143ff6d9bbaf8a6
                                                                                    • Instruction Fuzzy Hash: 0CF05E717013018FE724CF29D980656B7E1EBA9365F24807EE5C5D7761D3358C419B94
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: 11f5b55454e2001d57305e4d26194660ee260494afc1ae4151642f59c6b90a28
                                                                                    • Instruction ID: 073c3129693101c5e7833b7ffa09eca8aa7a1e81ff9bb2ce6bcaaab03392c7d4
                                                                                    • Opcode Fuzzy Hash: 11f5b55454e2001d57305e4d26194660ee260494afc1ae4151642f59c6b90a28
                                                                                    • Instruction Fuzzy Hash:
                                                                                    APIs
                                                                                    • GetVersion.KERNEL32(?,00418FF0,00000000,?,?,?,00000001), ref: 0041F126
                                                                                    • SetErrorMode.KERNEL32(00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F142
                                                                                    • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F14E
                                                                                    • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F15C
                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dRegister), ref: 0041F18C
                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dUnregister), ref: 0041F1B5
                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassCtl), ref: 0041F1CA
                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dSubclassDlgEx), ref: 0041F1DF
                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dDlgFramePaint), ref: 0041F1F4
                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dCtlColorEx), ref: 0041F209
                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dAutoSubclass), ref: 0041F21E
                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3dUnAutoSubclass), ref: 0041F233
                                                                                    • GetProcAddress.KERNEL32(00000001,Ctl3DColorChange), ref: 0041F248
                                                                                    • GetProcAddress.KERNEL32(00000001,BtnWndProc3d), ref: 0041F25D
                                                                                    • FreeLibrary.KERNEL32(00000001,?,00418FF0,00000000,?,?,?,00000001), ref: 0041F26F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$ErrorLibraryMode$FreeLoadVersion
                                                                                    • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                                                                    • API String ID: 2323315520-3614243559
                                                                                    • Opcode ID: 62814c6def9f01bce39a36d2c4270fbdb1234b3c2cb706e68bb71ccad2797809
                                                                                    • Instruction ID: e724c2aa341d6685c6ab1c4031cb88844a897dd828fe35f3324890dc483947ec
                                                                                    • Opcode Fuzzy Hash: 62814c6def9f01bce39a36d2c4270fbdb1234b3c2cb706e68bb71ccad2797809
                                                                                    • Instruction Fuzzy Hash: 8E314FB2640700ABEB01EBB9AC46A6B3794F328724741093FB508D7192D77C5C55CF5C
                                                                                    APIs
                                                                                    • GetTickCount.KERNEL32 ref: 0045862F
                                                                                    • QueryPerformanceCounter.KERNEL32(02193858,00000000,004588C2,?,?,02193858,00000000,?,00458FBE,?,02193858,00000000), ref: 00458638
                                                                                    • GetSystemTimeAsFileTime.KERNEL32(02193858,02193858), ref: 00458642
                                                                                    • GetCurrentProcessId.KERNEL32(?,02193858,00000000,004588C2,?,?,02193858,00000000,?,00458FBE,?,02193858,00000000), ref: 0045864B
                                                                                    • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004586C1
                                                                                    • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,02193858,02193858), ref: 004586CF
                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458717
                                                                                    • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,0045886D,?,00000000,C0000000,00000000,00499B24,00000003,00000000,00000000,00000000,0045887E), ref: 00458750
                                                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 004587F9
                                                                                    • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 0045882F
                                                                                    • CloseHandle.KERNEL32(000000FF,00458874,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 00458867
                                                                                      • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateHandle$CloseErrorFileLastNamedPipeProcessSystemTime$CountCounterCurrentDirectoryPerformanceQueryStateTick
                                                                                    • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                                                                    • API String ID: 770386003-3271284199
                                                                                    • Opcode ID: a79b95222fdd7f93703faf8b41e336e667bfcfce42d59c7d41cb43afe138310a
                                                                                    • Instruction ID: 54c9584e853abf465b9d0f30fdd509929e5717807e8393d963d4681616065440
                                                                                    • Opcode Fuzzy Hash: a79b95222fdd7f93703faf8b41e336e667bfcfce42d59c7d41cb43afe138310a
                                                                                    • Instruction Fuzzy Hash: 19710470A003449EDB11EB65CC45B9E77F4EB05705F1085BAF904FB282DB7899488F69
                                                                                    APIs
                                                                                      • Part of subcall function 00478370: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02192BDC,?,?,?,02192BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
                                                                                      • Part of subcall function 00478370: GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
                                                                                      • Part of subcall function 00478370: GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02192BDC,?,?,?,02192BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
                                                                                      • Part of subcall function 00478370: CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02192BDC,?,?,?,02192BDC), ref: 004783CC
                                                                                      • Part of subcall function 00478370: CloseHandle.KERNEL32(00000000,?,?,?,02192BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
                                                                                      • Part of subcall function 00478448: GetCurrentDirectoryA.KERNEL32(00000104,?,00000000,004784DA,?,?,?,02192BDC,?,0047853C,00000000,00478652,?,?,-00000010,?), ref: 00478478
                                                                                    • ShellExecuteEx.SHELL32(0000003C), ref: 0047858C
                                                                                    • GetLastError.KERNEL32(00000000,00478652,?,?,-00000010,?), ref: 00478595
                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 004785E2
                                                                                    • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 00478606
                                                                                    • CloseHandle.KERNEL32(00000000,00478637,00000000,00000000,000000FF,000000FF,00000000,00478630,?,00000000,00478652,?,?,-00000010,?), ref: 0047862A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Handle$CloseFile$AddressAttributesCodeCreateCurrentDirectoryErrorExecuteExitLastModuleMultipleObjectsProcProcessShellWait
                                                                                    • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                                                                    • API String ID: 883996979-221126205
                                                                                    • Opcode ID: e395260aa41f9ccfe4acc1b6a7661f4649f54ca3d6eb9a5996b4c5021f667ff4
                                                                                    • Instruction ID: b05a94d88e1d9ee0fbafe330a65326fe691daae9ca7e583bddfe233bc85c86e1
                                                                                    • Opcode Fuzzy Hash: e395260aa41f9ccfe4acc1b6a7661f4649f54ca3d6eb9a5996b4c5021f667ff4
                                                                                    • Instruction Fuzzy Hash: 0E314470A40208BEDB11EFE6C859ADEB7B8EB45718F50843FF508E7281DA7C99058B5D
                                                                                    APIs
                                                                                    • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 004229F4
                                                                                    • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422BBE), ref: 00422A04
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSendShowWindow
                                                                                    • String ID:
                                                                                    • API String ID: 1631623395-0
                                                                                    • Opcode ID: 7d35c436bdc301b114185cd71e9b34d3d25d314c488a7ae3a8b4f853deae8013
                                                                                    • Instruction ID: 9e9026b6a08d43f4c34b0c014f83afec13b9727198b5f0eb67f7172f0d04fbcb
                                                                                    • Opcode Fuzzy Hash: 7d35c436bdc301b114185cd71e9b34d3d25d314c488a7ae3a8b4f853deae8013
                                                                                    • Instruction Fuzzy Hash: 90915171B04214BFDB11EFA9DA86F9D77F4AB04304F5500BAF504AB392CB78AE419B58
                                                                                    APIs
                                                                                    • IsIconic.USER32(?), ref: 00418393
                                                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 004183B0
                                                                                    • GetWindowRect.USER32(?), ref: 004183CC
                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 004183DA
                                                                                    • GetWindowLongA.USER32(?,000000F8), ref: 004183EF
                                                                                    • ScreenToClient.USER32(00000000), ref: 004183F8
                                                                                    • ScreenToClient.USER32(00000000,?), ref: 00418403
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                    • String ID: ,
                                                                                    • API String ID: 2266315723-3772416878
                                                                                    • Opcode ID: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                                                                                    • Instruction ID: 8875a2d430ef8be2c5346fa25315cde737655516302bc4d2344e38a88124d083
                                                                                    • Opcode Fuzzy Hash: 093fbc58c9f2bb22a74bd7cb36b3f86111f4d6c014dbe9a16a5ffda61369e0f0
                                                                                    • Instruction Fuzzy Hash: 2B112B71505201ABEB00DF69C885F9B77E8AF48314F04067EFD58DB296D738D900CB65
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000028), ref: 004555F3
                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004555F9
                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 00455612
                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 00455639
                                                                                    • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 0045563E
                                                                                    • ExitWindowsEx.USER32(00000002,00000000), ref: 0045564F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                                                                    • String ID: SeShutdownPrivilege
                                                                                    • API String ID: 107509674-3733053543
                                                                                    • Opcode ID: e41b2ce6836bec360355d7b24c2a1717b910cfd1a437749fc580c6f152555136
                                                                                    • Instruction ID: 23182b732e3c774e917f784577cc733395bd6f0e504c2650860deaf78f25ff04
                                                                                    • Opcode Fuzzy Hash: e41b2ce6836bec360355d7b24c2a1717b910cfd1a437749fc580c6f152555136
                                                                                    • Instruction Fuzzy Hash: CBF0C870294B41B9EA10A6718C17F3B21C89B40709F80083ABD05E90D3D7BDD40C4A2E
                                                                                    APIs
                                                                                    • GetProcAddress.KERNEL32(10000000,ISCryptGetVersion), ref: 0045D191
                                                                                    • GetProcAddress.KERNEL32(10000000,ArcFourInit), ref: 0045D1A1
                                                                                    • GetProcAddress.KERNEL32(10000000,ArcFourCrypt), ref: 0045D1B1
                                                                                    • ISCryptGetVersion._ISCRYPT(10000000,ArcFourCrypt,10000000,ArcFourInit,10000000,ISCryptGetVersion,?,0047F96F,00000000,0047F998), ref: 0045D1D6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$CryptVersion
                                                                                    • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                                                                    • API String ID: 1951258720-508647305
                                                                                    • Opcode ID: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                                                                                    • Instruction ID: d394b6b565b4a55a8c16e24b867b534ad65140704dc94b035c924c7661ebf9a3
                                                                                    • Opcode Fuzzy Hash: dc81785b55ac876962535e0a2eb36b1dd730d24c9132c457d47d12d4ae2e21c2
                                                                                    • Instruction Fuzzy Hash: A2F030B0D41700CAD318EFF6AC957263B96EB9830AF14C03BA414C51A2D7794454DF2C
                                                                                    APIs
                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0,?,?,00000000,0049B628), ref: 004980FB
                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000010), ref: 0049817E
                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000), ref: 00498196
                                                                                    • FindClose.KERNEL32(000000FF,004981C1,004981BA,?,00000000,?,00000000,004981E2,?,?,00000000,0049B628,?,0049836C,00000000,004983C0), ref: 004981B4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileFind$AttributesCloseFirstNext
                                                                                    • String ID: isRS-$isRS-???.tmp
                                                                                    • API String ID: 134685335-3422211394
                                                                                    • Opcode ID: 4cf053d52b7de9e99314ef9443aa0be7ff49bfb1b7c6e14e5d4b85c56af708b1
                                                                                    • Instruction ID: fc6fb5a4e2302b333323d0d019d05182e8323e6fc1a1653111c694b95695a562
                                                                                    • Opcode Fuzzy Hash: 4cf053d52b7de9e99314ef9443aa0be7ff49bfb1b7c6e14e5d4b85c56af708b1
                                                                                    • Instruction Fuzzy Hash: E1316A719016186FCF10EF69CC42ADEBBBCDB45314F5044BBA808E3291DA3C9F458E58
                                                                                    APIs
                                                                                    • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457611
                                                                                    • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00457638
                                                                                    • SetForegroundWindow.USER32(?), ref: 00457649
                                                                                    • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,00457921,?,00000000,0045795D), ref: 0045790C
                                                                                    Strings
                                                                                    • Cannot evaluate variable because [Code] isn't running yet, xrefs: 0045778C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePostWindow$ForegroundNtdllProc_
                                                                                    • String ID: Cannot evaluate variable because [Code] isn't running yet
                                                                                    • API String ID: 2236967946-3182603685
                                                                                    • Opcode ID: 74e42c9c2b67fd5adc195c0662b506aaf6a0f02139eddaf5114ff9c1448628c8
                                                                                    • Instruction ID: 8776962154e21e4b1c8854f5ca4bcfaa90dd950cda3ad59ac2e2fede597431d6
                                                                                    • Opcode Fuzzy Hash: 74e42c9c2b67fd5adc195c0662b506aaf6a0f02139eddaf5114ff9c1448628c8
                                                                                    • Instruction Fuzzy Hash: 2B91D334608204DFEB15CF55E991F5ABBF5EB89704F2184BAE80497792C638AE04DB68
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00455F4B), ref: 00455E3C
                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 00455E42
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                    • API String ID: 1646373207-3712701948
                                                                                    • Opcode ID: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
                                                                                    • Instruction ID: d81c9a8c7c52065d28d66f53e81ce4f313aa74f068c2efe820cb9bfc493487ae
                                                                                    • Opcode Fuzzy Hash: 409835b603e199d4170178d82c1615a1651ba94ec2cafac24c158ef3a131e909
                                                                                    • Instruction Fuzzy Hash: B0418671A04649AFCF01EFA5C8929EEB7B8EF48305F504567F804F7292D67C5E098B68
                                                                                    APIs
                                                                                    • IsIconic.USER32(?), ref: 00417D0F
                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                                                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                                                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Placement$Iconic
                                                                                    • String ID: ,
                                                                                    • API String ID: 568898626-3772416878
                                                                                    • Opcode ID: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
                                                                                    • Instruction ID: e85585575f8c5a3e7823c55acc6b28d6d187d41511fbfc80546af44b70413e2d
                                                                                    • Opcode Fuzzy Hash: b31359e3e3f4af84bc1879df8bb30ee95a40fb82c66b770674b351632ff57231
                                                                                    • Instruction Fuzzy Hash: 4C2112716042089BDF10EF69D8C1AEA77B8AF48314F05456AFD18DF346D678DD84CBA8
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00000001,00000000,0046433F), ref: 004641CD
                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 00464213
                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642C8
                                                                                    • FindClose.KERNEL32(000000FF,004642F3,004642EC,?,00000000,?,00000000,0046430A,?,00000001,00000000,0046433F), ref: 004642E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$CloseErrorFirstModeNext
                                                                                    • String ID:
                                                                                    • API String ID: 4011626565-0
                                                                                    • Opcode ID: 1efd1e5842b6513eb7f92915edfbe8fc84401e145746a4d83abe9154eb57289a
                                                                                    • Instruction ID: 9d9184480f8630aada0b530c6bd54f2fc26159d28d851f3c8c43bf9f92f270d6
                                                                                    • Opcode Fuzzy Hash: 1efd1e5842b6513eb7f92915edfbe8fc84401e145746a4d83abe9154eb57289a
                                                                                    • Instruction Fuzzy Hash: 77418370A00A18DBCF10EFA5DC959DEB7B8EB88305F5044AAF804A7341E7789E448E59
                                                                                    APIs
                                                                                    • SetErrorMode.KERNEL32(00000001,00000000,00463E99), ref: 00463D0D
                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463D9C
                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E2E
                                                                                    • FindClose.KERNEL32(000000FF,00463E55,00463E4E,?,00000000,?,00000000,00463E6C,?,00000001,00000000,00463E99), ref: 00463E48
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$CloseErrorFirstModeNext
                                                                                    • String ID:
                                                                                    • API String ID: 4011626565-0
                                                                                    • Opcode ID: 7f0cfbd2c28eb096c2c7b79ad6d01cc7699265dce8ba217153498c446e9855ae
                                                                                    • Instruction ID: 85e7d80bc36d7b3e80fea797042c039a90a2821ca6a16b1e557570abf42aa49f
                                                                                    • Opcode Fuzzy Hash: 7f0cfbd2c28eb096c2c7b79ad6d01cc7699265dce8ba217153498c446e9855ae
                                                                                    • Instruction Fuzzy Hash: 3A41B770A00A589FCB11EF65CC45ADEB7B8EB88705F4044BAF404A7381E67D9F48CE59
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E956
                                                                                    • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E981
                                                                                    • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E98E
                                                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E996
                                                                                    • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452F3F,00000000,00452F60), ref: 0042E99C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$CloseControlCreateDeviceFileHandle
                                                                                    • String ID:
                                                                                    • API String ID: 1177325624-0
                                                                                    • Opcode ID: 00c40fca2cfdd97ba02e44e9efda7f487b55ec81a2bcf6d63bb4130569f45397
                                                                                    • Instruction ID: 661b18b1de4eb1238568a50ab540e77c3175952f9b14320adb6d96c9b056064d
                                                                                    • Opcode Fuzzy Hash: 00c40fca2cfdd97ba02e44e9efda7f487b55ec81a2bcf6d63bb4130569f45397
                                                                                    • Instruction Fuzzy Hash: 80F090B23A17207AF620B57A5C86F7F418CCB89B68F10423BBA04FF1D1D9A85D0555AD
                                                                                    APIs
                                                                                    • IsIconic.USER32(?), ref: 0048397A
                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 00483998
                                                                                    • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839BA
                                                                                    • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049C0A8,00482E56,00482E8A,00000000,00482EAA,?,?,?,0049C0A8), ref: 004839CE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Show$IconicLong
                                                                                    • String ID:
                                                                                    • API String ID: 2754861897-0
                                                                                    • Opcode ID: 388bc32bc28a7c539796bab44a6ba9bad50612e2c7d9e5998850325d2fd9b569
                                                                                    • Instruction ID: 3cea9153c2b451a1fdc95e78a984a36fb28f479a74ffefb17a89e5a976076ef3
                                                                                    • Opcode Fuzzy Hash: 388bc32bc28a7c539796bab44a6ba9bad50612e2c7d9e5998850325d2fd9b569
                                                                                    • Instruction Fuzzy Hash: 160156B0705200ABEA00BF659CCBB5F22C55714745F44093BF4459B292CAADDA859B5C
                                                                                    APIs
                                                                                    • FindFirstFileA.KERNEL32(00000000,?,00000000,00462824), ref: 004627A8
                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,00462804,?,00000000,?,00000000,00462824), ref: 004627E4
                                                                                    • FindClose.KERNEL32(000000FF,0046280B,00462804,?,00000000,?,00000000,00462824), ref: 004627FE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$File$CloseFirstNext
                                                                                    • String ID:
                                                                                    • API String ID: 3541575487-0
                                                                                    • Opcode ID: b12316252c39c0105a03a3a2020ea099ca75c42189d8bae58c1ecd15a925fcd0
                                                                                    • Instruction ID: e6acefadc91213b77ea930f6be1f86c6134c8588622ee3d3acab995ed1c325b6
                                                                                    • Opcode Fuzzy Hash: b12316252c39c0105a03a3a2020ea099ca75c42189d8bae58c1ecd15a925fcd0
                                                                                    • Instruction Fuzzy Hash: 87210831904B08BECB11EB65CC41ACEB7ACDB49304F5084B7E808E32A1F6789E44CE69
                                                                                    APIs
                                                                                    • IsIconic.USER32(?), ref: 004241E4
                                                                                    • SetActiveWindow.USER32(?,?,?,0046CD53), ref: 004241F1
                                                                                      • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                      • Part of subcall function 00423B14: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021925AC,0042420A,?,?,?,0046CD53), ref: 00423B4F
                                                                                    • SetFocus.USER32(00000000,?,?,?,0046CD53), ref: 0042421E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ActiveFocusIconicShow
                                                                                    • String ID:
                                                                                    • API String ID: 649377781-0
                                                                                    • Opcode ID: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                                                                                    • Instruction ID: c953833529836f01456b8f788e47b4b7c36f7a841d6c6df07f57e62630513da6
                                                                                    • Opcode Fuzzy Hash: 1be179083055f96161d8b165ddd04f1e3bd56871e014c6a07f585ac04199aa1a
                                                                                    • Instruction Fuzzy Hash: 8CF030B170012097CB10BFAAA8C5B9676A8AB48344F5500BBBD05DF357CA7CDC018778
                                                                                    APIs
                                                                                    • IsIconic.USER32(?), ref: 00417D0F
                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417D2D
                                                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 00417D63
                                                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417D8A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Placement$Iconic
                                                                                    • String ID:
                                                                                    • API String ID: 568898626-0
                                                                                    • Opcode ID: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
                                                                                    • Instruction ID: d9358ea7cd183770b33139a8ac7b7a0a70302bd2c01e5fc8313c3e2814ac7f2c
                                                                                    • Opcode Fuzzy Hash: 19084698f29920acc68274fefc6d1be37826273bcf8ca1bc36e8902df026f6c2
                                                                                    • Instruction Fuzzy Hash: 33012C71204108ABDB10EE59D8C1EF673A8AF45724F154566FD19DF242D639ED8087A8
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CaptureIconic
                                                                                    • String ID:
                                                                                    • API String ID: 2277910766-0
                                                                                    • Opcode ID: c22591b8c3f2be6e3e416ff0957708157ed46c57fff49ed7de8fa542590db40d
                                                                                    • Instruction ID: 6cb7601519473143bf4e876ebf6758ccc8fc4fa751d6c6e0357a6193460a6b05
                                                                                    • Opcode Fuzzy Hash: c22591b8c3f2be6e3e416ff0957708157ed46c57fff49ed7de8fa542590db40d
                                                                                    • Instruction Fuzzy Hash: 0AF0A4723056425BD730AB2EC984AB762F69F84314B14403BE419CBFA1EB3CDCC08798
                                                                                    APIs
                                                                                    • IsIconic.USER32(?), ref: 0042419B
                                                                                      • Part of subcall function 00423A84: EnumWindows.USER32(00423A1C), ref: 00423AA8
                                                                                      • Part of subcall function 00423A84: GetWindow.USER32(?,00000003), ref: 00423ABD
                                                                                      • Part of subcall function 00423A84: GetWindowLongA.USER32(?,000000EC), ref: 00423ACC
                                                                                      • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,\AB,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,004241AB,?,?,00423D73), ref: 00423B02
                                                                                    • SetActiveWindow.USER32(?,?,?,00423D73,00000000,0042415C), ref: 004241AF
                                                                                      • Part of subcall function 0042364C: ShowWindow.USER32(00410460,00000009,?,00000000,0041EDA4,0042393A,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423C0C), ref: 00423667
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ActiveEnumIconicLongShowWindows
                                                                                    • String ID:
                                                                                    • API String ID: 2671590913-0
                                                                                    • Opcode ID: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                                                                                    • Instruction ID: ce5d4440ec1c13bcfda566247f28ea27228b22b89c70f7a48f218b5e8bc86154
                                                                                    • Opcode Fuzzy Hash: b2ff140757208bd7b7cc33ac29151dbeb423d1cdddd3b288bc041a56f1810338
                                                                                    • Instruction Fuzzy Hash: 55E01AA070011087DB10AFAADCC8B9632A9BB48304F55017ABD49CF35BD63CC8608724
                                                                                    APIs
                                                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,004127D5), ref: 004127C3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: NtdllProc_Window
                                                                                    • String ID:
                                                                                    • API String ID: 4255912815-0
                                                                                    • Opcode ID: 120c9c179850e2d77f2b5158c289480559fb4752f9becda92d3f5c4f199058c9
                                                                                    • Instruction ID: 2c049f03cfb376e3baa0368465928f91904f6d03483072bf0e6cb5f6a46bccc5
                                                                                    • Opcode Fuzzy Hash: 120c9c179850e2d77f2b5158c289480559fb4752f9becda92d3f5c4f199058c9
                                                                                    • Instruction Fuzzy Hash: 4A5102357082048FD710DB6ADA80A9BF3E5EF98314B2082BBD814C77A1D7B8AD91C75D
                                                                                    APIs
                                                                                    • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00478C0E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: NtdllProc_Window
                                                                                    • String ID:
                                                                                    • API String ID: 4255912815-0
                                                                                    • Opcode ID: 35b14883da97521222dd4ba63ab43259808bc2fdd283b26f07d3c05bbd11cdae
                                                                                    • Instruction ID: 8fc52e73ba06cc46e730b07d7f7f94568764801a7b8f51cd1014d1f63996c257
                                                                                    • Opcode Fuzzy Hash: 35b14883da97521222dd4ba63ab43259808bc2fdd283b26f07d3c05bbd11cdae
                                                                                    • Instruction Fuzzy Hash: EC4148B5A44104DFCB10CF99C6888AAB7F5FB49310B64C99AF848DB701D738EE45DB58
                                                                                    APIs
                                                                                    • ArcFourCrypt._ISCRYPT(?,?,?,0046DEA4,?,?,0046DEA4,00000000), ref: 0045D247
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CryptFour
                                                                                    • String ID:
                                                                                    • API String ID: 2153018856-0
                                                                                    • Opcode ID: 60613f318f2e56de1b1058283c26d55875caf569050bffc963c4b4a7e30f6a75
                                                                                    • Instruction ID: 5effe0378c810cd07e0217cdc1e7a72ed78fe315a0c34b067f2c35eeb24cdbba
                                                                                    • Opcode Fuzzy Hash: 60613f318f2e56de1b1058283c26d55875caf569050bffc963c4b4a7e30f6a75
                                                                                    • Instruction Fuzzy Hash: D0C09BF200420CBF650057D5ECC9C77B75CE6586547408126F7048210195726C104574
                                                                                    APIs
                                                                                    • ArcFourCrypt._ISCRYPT(?,00000000,00000000,000003E8,0046DB14,?,0046DCF5), ref: 0045D25A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CryptFour
                                                                                    • String ID:
                                                                                    • API String ID: 2153018856-0
                                                                                    • Opcode ID: d774fb8793e7b9215c4f3788321c424c537fe54849dfeb2a35b58218e4d2cefe
                                                                                    • Instruction ID: 17600df93846144bfd8e61cd07b91608ca2a028cf3222f5d1774599e6ed580aa
                                                                                    • Opcode Fuzzy Hash: d774fb8793e7b9215c4f3788321c424c537fe54849dfeb2a35b58218e4d2cefe
                                                                                    • Instruction Fuzzy Hash: B7A002F0B80300BAFD2057F15E5EF26252C97D0F01F2084657306E90D085A56400853C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3931890356.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3931868399.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3931911050.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_10000000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                    • Instruction ID: 1c94840b05858ddf3503627acbaac9226f9c4a6e1659969bf0a936c2f155f8a0
                                                                                    • Opcode Fuzzy Hash: 550b9f88123d0c3b213a5d4b99e682963a3eaac5120c60ac7846f9a0f3bba5ba
                                                                                    • Instruction Fuzzy Hash: FF11303254D3D28FC305CF2894506D6FFE4AF6A640F194AAEE1D45B203C2659549C7A2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3931890356.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3931868399.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3931911050.0000000010002000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_10000000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                    • Instruction ID: 837d35c9df4effc004866add7a9100bdfed479f04b3922bb4bd4c5469ecd81ba
                                                                                    • Opcode Fuzzy Hash: aff350dcda9d135b5489d453054620cf61adfe11cc5af5bb48cdce25d513e1a9
                                                                                    • Instruction Fuzzy Hash:
                                                                                    APIs
                                                                                      • Part of subcall function 0044B604: GetVersionExA.KERNEL32(00000094), ref: 0044B621
                                                                                    • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
                                                                                    • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                                                                                    • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                                                                                    • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0044B7C9
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0044B7DB
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0044B7ED
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0044B7FF
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0044B811
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0044B823
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0044B835
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0044B847
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0044B859
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0044B86B
                                                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0044B87D
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0044B88F
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0044B8A1
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0044B8B3
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0044B8C5
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0044B8D7
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0044B8E9
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0044B8FB
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0044B90D
                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0044B91F
                                                                                    • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0044B931
                                                                                    • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0044B943
                                                                                    • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0044B955
                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0044B967
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0044B979
                                                                                    • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0044B98B
                                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0044B99D
                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0044B9AF
                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0044B9C1
                                                                                    • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0044B9D3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$LibraryLoadVersion
                                                                                    • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                    • API String ID: 1968650500-2910565190
                                                                                    • Opcode ID: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                                                                                    • Instruction ID: e93aa9000a3b975727f71862fff1c9a8a52c50bca2d3d110ef64c9f3a3b13d35
                                                                                    • Opcode Fuzzy Hash: 4248c38413e99d9464b79edb7fe9b1fdc4fa56b35b8262d24df0eec612bb70b6
                                                                                    • Instruction Fuzzy Hash: D391A8F0A40B11ABEB00EFB5AD96A2A3BA8EB15714310067BB454DF295D778DC108FDD
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 0041CA40
                                                                                    • CreateCompatibleDC.GDI32(?), ref: 0041CA4C
                                                                                    • CreateBitmap.GDI32(0041A944,?,00000001,00000001,00000000), ref: 0041CA70
                                                                                    • CreateCompatibleBitmap.GDI32(?,0041A944,?), ref: 0041CA80
                                                                                    • SelectObject.GDI32(0041CE3C,00000000), ref: 0041CA9B
                                                                                    • FillRect.USER32(0041CE3C,?,?), ref: 0041CAD6
                                                                                    • SetTextColor.GDI32(0041CE3C,00000000), ref: 0041CAEB
                                                                                    • SetBkColor.GDI32(0041CE3C,00000000), ref: 0041CB02
                                                                                    • PatBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00FF0062), ref: 0041CB18
                                                                                    • CreateCompatibleDC.GDI32(?), ref: 0041CB2B
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041CB5C
                                                                                    • SelectPalette.GDI32(00000000,00000000,00000001), ref: 0041CB74
                                                                                    • RealizePalette.GDI32(00000000), ref: 0041CB7D
                                                                                    • SelectPalette.GDI32(0041CE3C,00000000,00000001), ref: 0041CB8C
                                                                                    • RealizePalette.GDI32(0041CE3C), ref: 0041CB95
                                                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041CBAE
                                                                                    • SetBkColor.GDI32(00000000,00000000), ref: 0041CBC5
                                                                                    • BitBlt.GDI32(0041CE3C,00000000,00000000,0041A944,?,00000000,00000000,00000000,00CC0020), ref: 0041CBE1
                                                                                    • SelectObject.GDI32(00000000,?), ref: 0041CBEE
                                                                                    • DeleteDC.GDI32(00000000), ref: 0041CC04
                                                                                      • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ColorSelect$CreatePalette$CompatibleObject$BitmapRealizeText$DeleteFillRect
                                                                                    • String ID:
                                                                                    • API String ID: 269503290-0
                                                                                    • Opcode ID: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
                                                                                    • Instruction ID: 91afdf38925dfcc0a19aef53af63d8b93a06df8cfedaf367688fa0d34ebdb442
                                                                                    • Opcode Fuzzy Hash: 8288b1a004c19d08e53adfd80f36b756ff19622159534b91a17c952f52f31838
                                                                                    • Instruction Fuzzy Hash: 01610071A44648AFDF10EBE9DC86FDFB7B8EB48704F10446AB504E7281D67CA940CB68
                                                                                    APIs
                                                                                    • CoCreateInstance.OLE32(00499A74,00000000,00000001,00499774,?,00000000,004569E3), ref: 0045667E
                                                                                    • CoCreateInstance.OLE32(00499764,00000000,00000001,00499774,?,00000000,004569E3), ref: 004566A4
                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 0045685B
                                                                                    Strings
                                                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning), xrefs: 004567F1
                                                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption), xrefs: 004568CA
                                                                                    • IPersistFile::Save, xrefs: 00456962
                                                                                    • IShellLink::QueryInterface(IID_IPropertyStore), xrefs: 004567BD
                                                                                    • IShellLink::QueryInterface(IID_IPersistFile), xrefs: 00456904
                                                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall), xrefs: 00456892
                                                                                    • %ProgramFiles(x86)%\, xrefs: 0045672E
                                                                                    • IPropertyStore::SetValue(PKEY_AppUserModel_ID), xrefs: 00456840
                                                                                    • CoCreateInstance, xrefs: 004566AF
                                                                                    • {pf32}\, xrefs: 0045671E
                                                                                    • IPropertyStore::Commit, xrefs: 004568E3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateInstance$FreeString
                                                                                    • String ID: %ProgramFiles(x86)%\$CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue(PKEY_AppUserModel_ExcludeFromShowInNewInstall)$IPropertyStore::SetValue(PKEY_AppUserModel_ID)$IPropertyStore::SetValue(PKEY_AppUserModel_PreventPinning)$IPropertyStore::SetValue(PKEY_AppUserModel_StartPinOption)$IShellLink::QueryInterface(IID_IPersistFile)$IShellLink::QueryInterface(IID_IPropertyStore)${pf32}\
                                                                                    • API String ID: 308859552-2363233914
                                                                                    • Opcode ID: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
                                                                                    • Instruction ID: 2d3acbfbfe5134b3b68b6dcde43dfe431d970b0eaffbfac770a5f5266a6492d0
                                                                                    • Opcode Fuzzy Hash: 26ac11ebc8d2bbba6934e2b7da4071208c956f88b3f37f3572524cf0602978ca
                                                                                    • Instruction Fuzzy Hash: 39B13170A00104AFDB50DFA9C845B9E7BF8AF09706F5540AAF804E7362DB78DD48CB69
                                                                                    APIs
                                                                                    • ShowWindow.USER32(?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000,00498B29,?,00000000), ref: 00498453
                                                                                    • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000,?,00498B1F,00000000), ref: 00498466
                                                                                    • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000,00000000), ref: 00498476
                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00498497
                                                                                    • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00498768,?,?,00000000,?,00000000), ref: 004984A7
                                                                                      • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                                                                    • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                                                                    • API String ID: 2000705611-3672972446
                                                                                    • Opcode ID: d895cb7c5264c7428a24ad32bd1f4b93e6c699b182eb53adebeee5f7002e5ba1
                                                                                    • Instruction ID: 1a66146e65e487955493167600903b91e60bc3637ed1504a34615a6495e02ea1
                                                                                    • Opcode Fuzzy Hash: d895cb7c5264c7428a24ad32bd1f4b93e6c699b182eb53adebeee5f7002e5ba1
                                                                                    • Instruction Fuzzy Hash: 5191A434A042049FDF11EBA9DC52BAE7BE5EF4A304F5144BBF500AB692DE7C9C05CA19
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,0045A994,?,?,?,?,?,00000006,?,00000000,0049785D,?,00000000,00497900), ref: 0045A846
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                                                                    • API String ID: 1452528299-3112430753
                                                                                    • Opcode ID: 41204ac3778d0b79d3de2409b6c45a5b2ad533d11cb42b90e75a22724f80c331
                                                                                    • Instruction ID: 43962401d403c06de7b31dde6fd87328655f81364e16ca473e433d379c6e1912
                                                                                    • Opcode Fuzzy Hash: 41204ac3778d0b79d3de2409b6c45a5b2ad533d11cb42b90e75a22724f80c331
                                                                                    • Instruction Fuzzy Hash: EC719070B002545BCB00EB6998417AE77A49F4931AF91896BFC01AB383DB7C9E1DC75E
                                                                                    APIs
                                                                                    • GetVersion.KERNEL32 ref: 0045CBDA
                                                                                    • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045CBFA
                                                                                    • GetProcAddress.KERNEL32(00000000,GetNamedSecurityInfoW), ref: 0045CC07
                                                                                    • GetProcAddress.KERNEL32(00000000,SetNamedSecurityInfoW), ref: 0045CC14
                                                                                    • GetProcAddress.KERNEL32(00000000,SetEntriesInAclW), ref: 0045CC22
                                                                                      • Part of subcall function 0045CAC8: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045CB67,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045CB41
                                                                                    • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCDB
                                                                                    • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045CE15,?,?,00000000), ref: 0045CCE4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                                                                    • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                                                                    • API String ID: 59345061-4263478283
                                                                                    • Opcode ID: a232fc9af4861a9c5d561c4cdd8364b97c4fb44f2e207c549b4316288fabcd11
                                                                                    • Instruction ID: 99773ef8a3d0261052733c4904a47669a242c0659fe16ead1f438c4abb71ff4e
                                                                                    • Opcode Fuzzy Hash: a232fc9af4861a9c5d561c4cdd8364b97c4fb44f2e207c549b4316288fabcd11
                                                                                    • Instruction Fuzzy Hash: BD518471900308EFDB10DF99C881BEEBBB8EB48711F14806AF904E7241C678A945CFA9
                                                                                    APIs
                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0041B3C3
                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0041B3CD
                                                                                    • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B3DF
                                                                                    • CreateBitmap.GDI32(0000000B,?,00000001,00000001,00000000), ref: 0041B3F6
                                                                                    • GetDC.USER32(00000000), ref: 0041B402
                                                                                    • CreateCompatibleBitmap.GDI32(00000000,0000000B,?), ref: 0041B42F
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041B455
                                                                                    • SelectObject.GDI32(00000000,?), ref: 0041B470
                                                                                    • SelectObject.GDI32(?,00000000), ref: 0041B47F
                                                                                    • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                                                                                    • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                                                                                    • DeleteDC.GDI32(00000000), ref: 0041B4D0
                                                                                    • DeleteDC.GDI32(?), ref: 0041B4D9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                                                    • String ID:
                                                                                    • API String ID: 644427674-0
                                                                                    • Opcode ID: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                                                                                    • Instruction ID: 0f3e5998203d07172116f12fa3fedaa120d09cd030f2870c51d139f455c41937
                                                                                    • Opcode Fuzzy Hash: 9212dc48eb065078ffd6e64a0fe4b3e7e755c3ed7e1f96497366cc94fc87ddf9
                                                                                    • Instruction Fuzzy Hash: E941AD71E44619AFDB10DAE9C846FEFB7BCEB08704F104466B614F7281D6786D408BA8
                                                                                    APIs
                                                                                      • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00472D00
                                                                                    • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 00472E07
                                                                                    • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 00472E1D
                                                                                    • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 00472E42
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                                                                    • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                                                                    • API String ID: 971782779-3668018701
                                                                                    • Opcode ID: 2d89b570042f54901974877e938fd47b21837ccabee8972bdab534961fdf4a04
                                                                                    • Instruction ID: 7edda302242157afef40b0e7c7e05039b068dedd9e36cd510e855ba872eb221a
                                                                                    • Opcode Fuzzy Hash: 2d89b570042f54901974877e938fd47b21837ccabee8972bdab534961fdf4a04
                                                                                    • Instruction Fuzzy Hash: D0D14574A001489FDB11EFA9D981BDDBBF4AF08304F50816AF904B7392C778AE45CB69
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,?,00000000,?,00000000,00454B0D,?,0045AB6A,00000003,00000000,00000000,00454B44), ref: 0045498D
                                                                                      • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                    • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A11
                                                                                    • RegQueryValueExA.ADVAPI32(0045AB6A,00000000,00000000,00000000,?,00000004,00000000,00454A57,?,0045AB6A,00000000,00000000,?,00000000,?,00000000), ref: 00454A40
                                                                                    Strings
                                                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548AB
                                                                                    • RegOpenKeyEx, xrefs: 00454910
                                                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 004548E4
                                                                                    • , xrefs: 004548FE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: QueryValue$FormatMessageOpen
                                                                                    • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                    • API String ID: 2812809588-1577016196
                                                                                    • Opcode ID: 742d62a6869efcab47093dbd07b67c32618791e42156db71d55ecd28429abb8c
                                                                                    • Instruction ID: 3b35aed17da8244e85d272d2923899a44a2159637523a8fd9e70e85f8d21f96a
                                                                                    • Opcode Fuzzy Hash: 742d62a6869efcab47093dbd07b67c32618791e42156db71d55ecd28429abb8c
                                                                                    • Instruction Fuzzy Hash: 23914871E44148ABDB10DF95C842BDEB7FCEB49309F50406BF900FB282D6789E458B69
                                                                                    APIs
                                                                                      • Part of subcall function 00459364: RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004594FF
                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 00459569
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00000001,00000000,00000000,00459659,?,00000000,00000000,00000000), ref: 004595D0
                                                                                    Strings
                                                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v4.0, xrefs: 004594B2
                                                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 0045951C
                                                                                    • v1.1.4322, xrefs: 004595C2
                                                                                    • .NET Framework not found, xrefs: 0045961D
                                                                                    • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00459583
                                                                                    • .NET Framework version %s not found, xrefs: 00459609
                                                                                    • v4.0.30319, xrefs: 004594F1
                                                                                    • v2.0.50727, xrefs: 0045955B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close$Open
                                                                                    • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$SOFTWARE\Microsoft\.NETFramework\Policy\v4.0$v1.1.4322$v2.0.50727$v4.0.30319
                                                                                    • API String ID: 2976201327-446240816
                                                                                    • Opcode ID: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
                                                                                    • Instruction ID: e7879d346446e6db82ad1067b50e8ffdd52b59a139ce3e0e88c8f748029a0227
                                                                                    • Opcode Fuzzy Hash: 06cdcde3b802fa8939e5b925d5f0cc04c3aa7329a2dd441772a6abba54712f42
                                                                                    • Instruction Fuzzy Hash: EB51A331A04148EBCB01DFA8C8A1BEE77A5DB59305F54447BA801DB353EA3D9E1ECB19
                                                                                    APIs
                                                                                    • CloseHandle.KERNEL32(?), ref: 00458A7B
                                                                                    • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00458A97
                                                                                    • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00458AA5
                                                                                    • GetExitCodeProcess.KERNEL32(?), ref: 00458AB6
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458AFD
                                                                                    • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00458B19
                                                                                    Strings
                                                                                    • Helper process exited with failure code: 0x%x, xrefs: 00458AE3
                                                                                    • Helper isn't responding; killing it., xrefs: 00458A87
                                                                                    • Helper process exited., xrefs: 00458AC5
                                                                                    • Helper process exited, but failed to get exit code., xrefs: 00458AEF
                                                                                    • Stopping 64-bit helper process. (PID: %u), xrefs: 00458A6D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                                                                    • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                                                                    • API String ID: 3355656108-1243109208
                                                                                    • Opcode ID: 5acb86a21610ff93fc26a18ca7688f4a609edf5baed34ffefeefbdc5f868b4c1
                                                                                    • Instruction ID: 3f2324d87e707cedf1d5c4e10b6e93e7b0b52df74c864805f1ac214018e434b5
                                                                                    • Opcode Fuzzy Hash: 5acb86a21610ff93fc26a18ca7688f4a609edf5baed34ffefeefbdc5f868b4c1
                                                                                    • Instruction Fuzzy Hash: 2F2130706087409AD720E779C44575BB6D49F08345F04CC2FF99AEB283DF78E8488B2A
                                                                                    APIs
                                                                                      • Part of subcall function 0042DDE4: RegCreateKeyExA.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DE10
                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045464F
                                                                                    • RegCloseKey.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004546FF,?,00000000,004547C3), ref: 0045478B
                                                                                      • Part of subcall function 0042E8C8: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00453273,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E8E7
                                                                                    Strings
                                                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454567
                                                                                    • , xrefs: 004545B1
                                                                                    • RegCreateKeyEx, xrefs: 004545C3
                                                                                    • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00454597
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateFormatMessageQueryValue
                                                                                    • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                                                                    • API String ID: 2481121983-1280779767
                                                                                    • Opcode ID: 1658ad98f5d652d8ab18f870bc50976d397f5a9f15be4283fc870004d2c294f4
                                                                                    • Instruction ID: 93c55a0ab54dbcba353dd8d7ef9dbdddde8d62e860aeeeeaccb8ee2ace91ec52
                                                                                    • Opcode Fuzzy Hash: 1658ad98f5d652d8ab18f870bc50976d397f5a9f15be4283fc870004d2c294f4
                                                                                    • Instruction Fuzzy Hash: 49810F75A00209AFDB00DFD5C981BDEB7B8EB49309F10452AF900FB282D7789E45CB69
                                                                                    APIs
                                                                                      • Part of subcall function 004538BC: CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
                                                                                      • Part of subcall function 004538BC: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
                                                                                    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 00496CCD
                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000080,00000000,00496E21), ref: 00496CEE
                                                                                    • CreateWindowExA.USER32(00000000,STATIC,00496E30,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00496D15
                                                                                    • SetWindowLongA.USER32(?,000000FC,004964A8), ref: 00496D28
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC,00496E30), ref: 00496D58
                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00496DCC
                                                                                    • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000), ref: 00496DD8
                                                                                      • Part of subcall function 00453D30: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                                                                                    • DestroyWindow.USER32(?,00496DFB,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00496DF4,?,?,000000FC,004964A8,00000000,STATIC), ref: 00496DEE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$File$CloseCreateHandle$AttributesCopyDestroyLongMultipleObjectsPrivateProfileStringWaitWrite
                                                                                    • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                                                                    • API String ID: 1549857992-2312673372
                                                                                    • Opcode ID: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
                                                                                    • Instruction ID: 18f462a79ff6f3765b6ab1b49dcd34ad23a8ddcce266b6658739bc0f5698dca4
                                                                                    • Opcode Fuzzy Hash: e4b2ecfcfa893ff17553470f1835d2c21342bacfaf5c8ca03e615e843d4af16f
                                                                                    • Instruction Fuzzy Hash: 61414C70A40208AFDF00EBA5DD42F9E7BB8EB08714F52457AF510F7291D7799E008B68
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E441
                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042E447
                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E51D,?,00000000,0047E6DC,00000000), ref: 0042E495
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressCloseHandleModuleProc
                                                                                    • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$QaE$kernel32.dll
                                                                                    • API String ID: 4190037839-2312295185
                                                                                    • Opcode ID: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
                                                                                    • Instruction ID: f42d7e7755912f49377b3a3c2778cbb45b18f2cdc7334bb7b0fb93ca3fe573dd
                                                                                    • Opcode Fuzzy Hash: 6084c433af3ee4d64f0cd9982e7ad42a34d4dd09e5920a5815d9b88696e74604
                                                                                    • Instruction Fuzzy Hash: E8213230B10225BBDB10EAE6DC51B9E76B8EB44308F90447BA504E7281E77CDE419B5C
                                                                                    APIs
                                                                                    • GetActiveWindow.USER32 ref: 004629FC
                                                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 00462A10
                                                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 00462A1D
                                                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00462A2A
                                                                                    • GetWindowRect.USER32(?,00000000), ref: 00462A76
                                                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00462AB4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                    • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                    • API String ID: 2610873146-3407710046
                                                                                    • Opcode ID: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
                                                                                    • Instruction ID: 865a179037155f8fdabe2954c964c2dd38b7d55406d5d1e7c7801a7b23b437f8
                                                                                    • Opcode Fuzzy Hash: 49e394185691d1c2da29acdf0cb3719649ef4a9244e3d7219ece30713ed86938
                                                                                    • Instruction Fuzzy Hash: B7219575701B057BD610D6A88D85F3B36D8EB84715F094A2AF944DB3C1E6F8EC018B9A
                                                                                    APIs
                                                                                    • GetActiveWindow.USER32 ref: 0042F194
                                                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042F1A8
                                                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromWindow), ref: 0042F1B5
                                                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 0042F1C2
                                                                                    • GetWindowRect.USER32(?,00000000), ref: 0042F20E
                                                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042F24C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$AddressProc$ActiveHandleModuleRect
                                                                                    • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                                                                    • API String ID: 2610873146-3407710046
                                                                                    • Opcode ID: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
                                                                                    • Instruction ID: 50a2e38ba83faf67dd7c56e8d7733487d454ef14a416094e89dadcccf0bf0910
                                                                                    • Opcode Fuzzy Hash: d786bd72f778b9cca068a569f688e0802e61ee9ccadb1309323c976dabd5d685
                                                                                    • Instruction Fuzzy Hash: 3821F279704710ABD300EA68ED41F3B37A9DB89714F88457AF944DB382DA79EC044BA9
                                                                                    APIs
                                                                                    • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00458DFB,?,00000000,00458E5E,?,?,02193858,00000000), ref: 00458C79
                                                                                    • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02193858,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CD6
                                                                                    • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,02193858,?,00000000,00458D90,?,00000000,00000001,00000000,00000000,00000000,00458DFB), ref: 00458CE3
                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00458D2F
                                                                                    • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,02193858,?,00000000,00458D90,?,00000000), ref: 00458D55
                                                                                    • GetLastError.KERNEL32(?,?,00000000,00000001,00458D69,?,-00000020,0000000C,-00004034,00000014,02193858,?,00000000,00458D90,?,00000000), ref: 00458D5C
                                                                                      • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                                                                    • String ID: CreateEvent$TransactNamedPipe
                                                                                    • API String ID: 2182916169-3012584893
                                                                                    • Opcode ID: 7b509680db312d6d9eeee96a6ca75077f36d693cf911451bc7dd7bcd49c3517f
                                                                                    • Instruction ID: 06b5d05a5e38ae799b2edb69ba26f0faef77b18cb4ad173b91f5c3c95d125767
                                                                                    • Opcode Fuzzy Hash: 7b509680db312d6d9eeee96a6ca75077f36d693cf911451bc7dd7bcd49c3517f
                                                                                    • Instruction Fuzzy Hash: EF418E75A00608AFDB15DF95C981F9EB7F8EB48714F1044AAF900F72D2DA789E44CA28
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00456E85,?,?,00000031,?), ref: 00456D48
                                                                                    • GetProcAddress.KERNEL32(00000000,OLEAUT32.DLL), ref: 00456D4E
                                                                                    • LoadTypeLib.OLEAUT32(00000000,?), ref: 00456D9B
                                                                                      • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressErrorHandleLastLoadModuleProcType
                                                                                    • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                                                                    • API String ID: 1914119943-2711329623
                                                                                    • Opcode ID: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                                                                                    • Instruction ID: d1bb8c6bfccdc0522a96f5e3020b18907c52df716e7671809b7eaf465cfb4023
                                                                                    • Opcode Fuzzy Hash: e2963ea3afedc97cdb575031c9274042e2bd1e61e6c3a56a36b999a051922bf2
                                                                                    • Instruction Fuzzy Hash: 6831A375A00604AFDB41EFAACC12D5BB7BDEB8970675244A6FD04D3352DB38DD08CA28
                                                                                    APIs
                                                                                    • RectVisible.GDI32(?,?), ref: 00416E13
                                                                                    • SaveDC.GDI32(?), ref: 00416E27
                                                                                    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416E4A
                                                                                    • RestoreDC.GDI32(?,?), ref: 00416E65
                                                                                    • CreateSolidBrush.GDI32(00000000), ref: 00416EE5
                                                                                    • FrameRect.USER32(?,?,?), ref: 00416F18
                                                                                    • DeleteObject.GDI32(?), ref: 00416F22
                                                                                    • CreateSolidBrush.GDI32(00000000), ref: 00416F32
                                                                                    • FrameRect.USER32(?,?,?), ref: 00416F65
                                                                                    • DeleteObject.GDI32(?), ref: 00416F6F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                                                                    • String ID:
                                                                                    • API String ID: 375863564-0
                                                                                    • Opcode ID: c69605c35faac69eeef83e1ef2bcb629ef32bf90482d96ab6e01708da643fe70
                                                                                    • Instruction ID: c082a38e55a2621cff38c0036c5e412d4739722926df34ebe37a7eff5f7859fc
                                                                                    • Opcode Fuzzy Hash: c69605c35faac69eeef83e1ef2bcb629ef32bf90482d96ab6e01708da643fe70
                                                                                    • Instruction Fuzzy Hash: 70515A712086459FDB50EF69C8C4B9B77E8AF48314F15466AFD488B286C738EC81CB99
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                                                                    • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                                                                    • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                                                                    • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                                                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                                                                    • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                                                                    • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                                                                    • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                                                                    • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                                                                    • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$HandlePointer$CloseCreateErrorLastReadSizeType
                                                                                    • String ID:
                                                                                    • API String ID: 1694776339-0
                                                                                    • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                    • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                                                                    • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                                                                    • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                                                                    APIs
                                                                                    • GetSystemMenu.USER32(00000000,00000000), ref: 00422233
                                                                                    • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 00422251
                                                                                    • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042225E
                                                                                    • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0042226B
                                                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 00422278
                                                                                    • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 00422285
                                                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422292
                                                                                    • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042229F
                                                                                    • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 004222BD
                                                                                    • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 004222D9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Delete$EnableItem$System
                                                                                    • String ID:
                                                                                    • API String ID: 3985193851-0
                                                                                    • Opcode ID: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
                                                                                    • Instruction ID: 662ae76830c3dbb110fd6952920e185112f137d20e740dc0dcce1beff7d7cd05
                                                                                    • Opcode Fuzzy Hash: 794ac4a4d1563d503d4e128f610caca5ba976f2c29ed192f4e654ec8c2abe850
                                                                                    • Instruction Fuzzy Hash: AF2144703407047AE720E724CD8BF9BBBD89B04708F5451A5BA487F6D3C6F9AB804698
                                                                                    APIs
                                                                                    • FreeLibrary.KERNEL32(10000000), ref: 00481A11
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00481A25
                                                                                    • SendNotifyMessageA.USER32(00020436,00000496,00002710,00000000), ref: 00481A97
                                                                                    Strings
                                                                                    • Not restarting Windows because Setup is being run from the debugger., xrefs: 00481A46
                                                                                    • Restarting Windows., xrefs: 00481A72
                                                                                    • DeinitializeSetup, xrefs: 0048190D
                                                                                    • GetCustomSetupExitCode, xrefs: 004818B1
                                                                                    • Deinitializing Setup., xrefs: 00481872
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FreeLibrary$MessageNotifySend
                                                                                    • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                                                                    • API String ID: 3817813901-1884538726
                                                                                    • Opcode ID: b2d1279a618dd00e76101f6ddb87be929459601488252b11527f6c6d16611b1a
                                                                                    • Instruction ID: b122ee3e0244d1cffd13458a0655c780be2d4a3cdc4850abd58d30bc7702deed
                                                                                    • Opcode Fuzzy Hash: b2d1279a618dd00e76101f6ddb87be929459601488252b11527f6c6d16611b1a
                                                                                    • Instruction Fuzzy Hash: C651BF347042409FD715EB69E9A5B6E7BE8EB19314F10887BE800C72B2DB389C46CB5D
                                                                                    APIs
                                                                                    • SHGetMalloc.SHELL32(?), ref: 004616C7
                                                                                    • GetActiveWindow.USER32 ref: 0046172B
                                                                                    • CoInitialize.OLE32(00000000), ref: 0046173F
                                                                                    • SHBrowseForFolder.SHELL32(?), ref: 00461756
                                                                                    • CoUninitialize.OLE32(00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046176B
                                                                                    • SetActiveWindow.USER32(?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 00461781
                                                                                    • SetActiveWindow.USER32(?,?,00461797,00000000,?,?,?,?,?,00000000,0046181B), ref: 0046178A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                                                                    • String ID: A
                                                                                    • API String ID: 2684663990-3554254475
                                                                                    • Opcode ID: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
                                                                                    • Instruction ID: 0f37cca2ee7d5c89cd5c8fe3b5c5f67eac08b275376d6c087401a1ac056189be
                                                                                    • Opcode Fuzzy Hash: cb3d39f68a826354347aa7a8a61ff080deb010c50648a66159b3978de9eda5bc
                                                                                    • Instruction Fuzzy Hash: C3312F70E00348AFDB10EFA6D885A9EBBF8EB09304F55847AF404E7251E7785A048F59
                                                                                    APIs
                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15,?,?,00000000,00472F84), ref: 00472A1C
                                                                                      • Part of subcall function 0042CD94: GetPrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000,00000100,00000000), ref: 0042CE0A
                                                                                      • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000,?,00472D15), ref: 00472A93
                                                                                    • RemoveDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00472AB9,?,?,?,00000008,00000000,00000000,00000000), ref: 00472A99
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Attributes$DeleteDirectoryPrivateProfileRemoveString
                                                                                    • String ID: .ShellClassInfo$CLSID2$desktop.ini$target.lnk${0AFACED1-E828-11D1-9187-B532F1E9575D}
                                                                                    • API String ID: 884541143-1710247218
                                                                                    • Opcode ID: c45dacd24f7b5bc8c90ad3d0814151273abff7c22a7deb77a2667df06dffab17
                                                                                    • Instruction ID: 1765d5ebfc4e6887f49e3816ac39c9d5a3c16910e93b0aec031ce55b1572895b
                                                                                    • Opcode Fuzzy Hash: c45dacd24f7b5bc8c90ad3d0814151273abff7c22a7deb77a2667df06dffab17
                                                                                    • Instruction Fuzzy Hash: 6711B2707005147BD721EAAA8D82B9F73ACDB49714F61C17BB404B72C2DBBCAE01861C
                                                                                    APIs
                                                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,00401B68), ref: 00401ABD
                                                                                    • LocalFree.KERNEL32(0063EA60,00000000,00401B68), ref: 00401ACF
                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000,0063EA60,00000000,00401B68), ref: 00401AEE
                                                                                    • LocalFree.KERNEL32(0063FA60,?,00000000,00008000,0063EA60,00000000,00401B68), ref: 00401B2D
                                                                                    • RtlLeaveCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B58
                                                                                    • RtlDeleteCriticalSection.KERNEL32(0049B420,00401B6F), ref: 00401B62
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                                                                    • String ID: 4dtd$`c
                                                                                    • API String ID: 3782394904-339694905
                                                                                    • Opcode ID: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                                    • Instruction ID: 79795942c165c44483fb09e1962e32eaca51f8de38df00e9c029d8aa05623ce8
                                                                                    • Opcode Fuzzy Hash: ef0d8b2142be7cf42810e170793bf0a6b8446fdea194a224c38922696d0a74e0
                                                                                    • Instruction Fuzzy Hash: 3B118E30A003405AEB15AB65BE85B263BA5D761B08F44407BF80067BF3D77C5850E7AE
                                                                                    APIs
                                                                                    • GetProcAddress.KERNEL32(00000000,inflateInit_), ref: 0045D2BD
                                                                                    • GetProcAddress.KERNEL32(00000000,inflate), ref: 0045D2CD
                                                                                    • GetProcAddress.KERNEL32(00000000,inflateEnd), ref: 0045D2DD
                                                                                    • GetProcAddress.KERNEL32(00000000,inflateReset), ref: 0045D2ED
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                                                                    • API String ID: 190572456-3516654456
                                                                                    • Opcode ID: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                                                                                    • Instruction ID: d913f85fec6517a53d2ec7ba369195fd603025f4bffd93910817278a70f0814a
                                                                                    • Opcode Fuzzy Hash: 5039b32c95ab4f878aa340bc95ef1656196d0563f790867e571847c0b893819f
                                                                                    • Instruction Fuzzy Hash: C20112B0D00701DBE724DFF6ACC672636A5ABA8306F14C03B9D09962A2D77D0459DF2E
                                                                                    APIs
                                                                                    • SetBkColor.GDI32(?,00000000), ref: 0041A9B9
                                                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0041A9F3
                                                                                    • SetBkColor.GDI32(?,?), ref: 0041AA08
                                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041AA52
                                                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041AA5D
                                                                                    • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041AA6D
                                                                                    • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AAAC
                                                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0041AAB6
                                                                                    • SetBkColor.GDI32(00000000,?), ref: 0041AAC3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$StretchText
                                                                                    • String ID:
                                                                                    • API String ID: 2984075790-0
                                                                                    • Opcode ID: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
                                                                                    • Instruction ID: 4467ea82dd13d464879b0bd0dd0607b47ee3045dce17e21d2c6451b7f26a8ea4
                                                                                    • Opcode Fuzzy Hash: c2c61a06e11fc6ac6c72d0136d8e20986a2ab5507b690e8d84a304c9a27ba9fd
                                                                                    • Instruction Fuzzy Hash: 8761E5B5A00505AFCB40EFADD985E9AB7F8EF08314B10816AF908DB262C775ED40CF58
                                                                                    APIs
                                                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                    • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00458278,?, /s ",?,regsvr32.exe",?,00458278), ref: 004581EA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseDirectoryHandleSystem
                                                                                    • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                                                                    • API String ID: 2051275411-1862435767
                                                                                    • Opcode ID: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
                                                                                    • Instruction ID: cda81b302c56d3c3b7af3d8ffa4af26d40175ae7a7c1cff7e24eee752c39b11a
                                                                                    • Opcode Fuzzy Hash: 4002d2de1ab03b38d977d670fcb0d45de6735b09ab9cf6adf03ef289ce7e4165
                                                                                    • Instruction Fuzzy Hash: 21411670A047486BDB10EFD6D842B8DBBF9AF45305F50407FB904BB292DF789A098B19
                                                                                    APIs
                                                                                    • OffsetRect.USER32(?,00000001,00000001), ref: 0044D1A9
                                                                                    • GetSysColor.USER32(00000014), ref: 0044D1B0
                                                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0044D1C8
                                                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D1F1
                                                                                    • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044D1FB
                                                                                    • GetSysColor.USER32(00000010), ref: 0044D202
                                                                                    • SetTextColor.GDI32(00000000,00000000), ref: 0044D21A
                                                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D243
                                                                                    • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044D26E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Text$Color$Draw$OffsetRect
                                                                                    • String ID:
                                                                                    • API String ID: 1005981011-0
                                                                                    • Opcode ID: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
                                                                                    • Instruction ID: 8406a00effd73db105afccad7da3796984cf264811f0ddac3e5cace4e0ac1d2b
                                                                                    • Opcode Fuzzy Hash: 32856f07fc45aa5b94f1f38070a47e962b22e9d58654105098b1be26c78061dc
                                                                                    • Instruction Fuzzy Hash: A021BDB42015047FC710FB2ACD8AE8B6BDCDF19319B05457AB958EB292C67CDD404668
                                                                                    APIs
                                                                                    • GetFocus.USER32 ref: 0041B745
                                                                                    • GetDC.USER32(?), ref: 0041B751
                                                                                    • SelectPalette.GDI32(00000000,?,00000000), ref: 0041B786
                                                                                    • RealizePalette.GDI32(00000000), ref: 0041B792
                                                                                    • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041B7C0
                                                                                    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041B7F4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                    • String ID: %H
                                                                                    • API String ID: 3275473261-1959103961
                                                                                    • Opcode ID: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                                                                                    • Instruction ID: 38bdddf8d72f5571b31e8017bfcff87152bbfcb95d4f6cd7f9962c0a723fddb9
                                                                                    • Opcode Fuzzy Hash: 9b17a45ebd00e155e5aeae17ac6cac102e8e00fd56b9a0d3692e3d2bf0971335
                                                                                    • Instruction Fuzzy Hash: 8A512F70A002099FDF11DFA9C881AEEBBF9FF49704F104066F504A7791D7799981CBA9
                                                                                    APIs
                                                                                    • GetFocus.USER32 ref: 0041BA17
                                                                                    • GetDC.USER32(?), ref: 0041BA23
                                                                                    • SelectPalette.GDI32(00000000,?,00000000), ref: 0041BA5D
                                                                                    • RealizePalette.GDI32(00000000), ref: 0041BA69
                                                                                    • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BA8D
                                                                                    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 0041BAC1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Palette$Select$BitmapCreateFocusRealize
                                                                                    • String ID: %H
                                                                                    • API String ID: 3275473261-1959103961
                                                                                    • Opcode ID: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                                                                                    • Instruction ID: 3fcaffe560058c7771eaec6053d79e0e1924f360d52694d27862de55114c0f48
                                                                                    • Opcode Fuzzy Hash: f1b656a7ede54f8d65f93cc35dc493626dae048aef23b352968a277fb398f08e
                                                                                    • Instruction Fuzzy Hash: 9D512A74A002189FDB11DFA9C891AAEBBF9FF49700F154066F904EB751D738AD40CBA4
                                                                                    APIs
                                                                                      • Part of subcall function 0045092C: SetEndOfFile.KERNEL32(?,?,0045C342,00000000,0045C4CD,?,00000000,00000002,00000002), ref: 00450933
                                                                                      • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                    • GetWindowThreadProcessId.USER32(00000000,?), ref: 00496585
                                                                                    • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 00496599
                                                                                    • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 004965B3
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965BF
                                                                                    • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965C5
                                                                                    • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 004965D8
                                                                                    Strings
                                                                                    • Deleting Uninstall data files., xrefs: 004964FB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileProcess$CloseDeleteHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                                                                    • String ID: Deleting Uninstall data files.
                                                                                    • API String ID: 1570157960-2568741658
                                                                                    • Opcode ID: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
                                                                                    • Instruction ID: caddedc05ae4add9971b90b84c259ce0cd5246952d50e779d54ebc968ffbf915
                                                                                    • Opcode Fuzzy Hash: 8e8cb50e53c2c3b2038bacabf8c777ac21aad5dfe2dc8a8db11d37eec289bdf4
                                                                                    • Instruction Fuzzy Hash: 73216170204250BFEB10EB6ABC82B2637A8DB54728F53453BB501961D6DA7CAC448A6D
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegSetValueExA.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9,?,?,?,?,00000000), ref: 00470263
                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,004702F9), ref: 0047027A
                                                                                    • AddFontResourceA.GDI32(00000000), ref: 00470297
                                                                                    • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 004702AB
                                                                                    Strings
                                                                                    • Failed to open Fonts registry key., xrefs: 00470281
                                                                                    • AddFontResource, xrefs: 004702B5
                                                                                    • Failed to set value in Fonts registry key., xrefs: 0047026C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseFontMessageNotifyOpenResourceSendValue
                                                                                    • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                                                                    • API String ID: 955540645-649663873
                                                                                    • Opcode ID: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
                                                                                    • Instruction ID: 122e39bb1ea2b43e4c2a7da55aa69ddad999e5e54c07bca5f4119535fc7344d3
                                                                                    • Opcode Fuzzy Hash: f6cb4db48621d05014dac95341ab5faf08594db0be4636be460d29a68d9f0f75
                                                                                    • Instruction Fuzzy Hash: 6921E271741204BBDB10EAA68C46FAE67AC9B14704F208477B904EB3C3DA7C9E01866D
                                                                                    APIs
                                                                                      • Part of subcall function 00416410: GetClassInfoA.USER32(00400000,?,?), ref: 0041647F
                                                                                      • Part of subcall function 00416410: UnregisterClassA.USER32(?,00400000), ref: 004164AB
                                                                                      • Part of subcall function 00416410: RegisterClassA.USER32(?), ref: 004164CE
                                                                                    • GetVersion.KERNEL32 ref: 00462E60
                                                                                    • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00462E9E
                                                                                    • SHGetFileInfo.SHELL32(00462F3C,00000000,?,00000160,00004011), ref: 00462EBB
                                                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 00462ED9
                                                                                    • SetCursor.USER32(00000000,00000000,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462EDF
                                                                                    • SetCursor.USER32(?,00462F1F,00007F02,00462F3C,00000000,?,00000160,00004011), ref: 00462F12
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                                                                    • String ID: Explorer
                                                                                    • API String ID: 2594429197-512347832
                                                                                    • Opcode ID: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                                                                                    • Instruction ID: b0f6820fd5a5ea072646c086af9eca81c98a3cd1ffd9b7ca0f87214cf94a4ba1
                                                                                    • Opcode Fuzzy Hash: 271d5cc6534746d744017855cbe3809792a4a5bc456b5a0a77df68c724b1ffee
                                                                                    • Instruction Fuzzy Hash: CD21E7307403047AEB15BB759D47B9A3798DB09708F4004BFFA05EA1C3EEBD9901966D
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,02192BDC,?,?,?,02192BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 00478389
                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0047838F
                                                                                    • GetFileAttributesA.KERNEL32(00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02192BDC,?,?,?,02192BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783A2
                                                                                    • CreateFileA.KERNEL32(00000000,00000000,00000007,00000000,00000003,00000000,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,02192BDC,?,?,?,02192BDC), ref: 004783CC
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,02192BDC,00478534,00000000,00478652,?,?,-00000010,?), ref: 004783EA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileHandle$AddressAttributesCloseCreateModuleProc
                                                                                    • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                                                                    • API String ID: 2704155762-2318956294
                                                                                    • Opcode ID: 606546fc07dcf4a3bd117f62e36919ba8c62e6b487fb6962041f4ee6dba1ecda
                                                                                    • Instruction ID: 2a72e966618face2f1bd82d2a524167157479a72732682c44667b4342ad9b4bf
                                                                                    • Opcode Fuzzy Hash: 606546fc07dcf4a3bd117f62e36919ba8c62e6b487fb6962041f4ee6dba1ecda
                                                                                    • Instruction Fuzzy Hash: 370180A07C070536E520316A4C8AFBB654C8B50769F14863FBA1DFA2D3FDED9D06016E
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,00459F8E,?,00000000,00000000,00000000,?,00000006,?,00000000,0049785D,?,00000000,00497900), ref: 00459ED2
                                                                                      • Part of subcall function 004543F4: FindClose.KERNEL32(000000FF,004544EA), ref: 004544D9
                                                                                    Strings
                                                                                    • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00459F47
                                                                                    • Failed to delete directory (%d)., xrefs: 00459F68
                                                                                    • Failed to strip read-only attribute., xrefs: 00459EA0
                                                                                    • Deleting directory: %s, xrefs: 00459E5B
                                                                                    • Failed to delete directory (%d). Will retry later., xrefs: 00459EEB
                                                                                    • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00459EAC
                                                                                    • Stripped read-only attribute., xrefs: 00459E94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseErrorFindLast
                                                                                    • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                                                                    • API String ID: 754982922-1448842058
                                                                                    • Opcode ID: 9c44e2e7f6fe757755561f6ca8568e0fef47b87f075e017b2858cb20ebfba709
                                                                                    • Instruction ID: b8d9b7298ea7c3337bda5d500217c07e27fbd6b384233f4239b27a523d6d10d0
                                                                                    • Opcode Fuzzy Hash: 9c44e2e7f6fe757755561f6ca8568e0fef47b87f075e017b2858cb20ebfba709
                                                                                    • Instruction Fuzzy Hash: 1841A331A04208CACB10EB69C8413AEB6A55F4530AF54897BAC01D73D3CB7C8E0DC75E
                                                                                    APIs
                                                                                    • GetCapture.USER32 ref: 00422EA4
                                                                                    • GetCapture.USER32 ref: 00422EB3
                                                                                    • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422EB9
                                                                                    • ReleaseCapture.USER32 ref: 00422EBE
                                                                                    • GetActiveWindow.USER32 ref: 00422ECD
                                                                                    • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422F4C
                                                                                    • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422FB0
                                                                                    • GetActiveWindow.USER32 ref: 00422FBF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                    • String ID:
                                                                                    • API String ID: 862346643-0
                                                                                    • Opcode ID: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
                                                                                    • Instruction ID: c6261992695b47722d84ffa44129b55dc5b2a4dad2f70b0012283783c1c7b094
                                                                                    • Opcode Fuzzy Hash: b1a57ae8c862de22bc82aa702dd5f84040ee9f6a0804fcde46ad074f7f3e30fe
                                                                                    • Instruction Fuzzy Hash: 24417230B00245AFDB10EB69DA86B9E77F1EF44304F5540BAF404AB2A2D778AE40DB49
                                                                                    APIs
                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0042F2BA
                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0042F2D1
                                                                                    • GetActiveWindow.USER32 ref: 0042F2DA
                                                                                    • MessageBoxA.USER32(00000000,00000000,00000000,00000000), ref: 0042F307
                                                                                    • SetActiveWindow.USER32(?,0042F437,00000000,?), ref: 0042F328
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ActiveLong$Message
                                                                                    • String ID:
                                                                                    • API String ID: 2785966331-0
                                                                                    • Opcode ID: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
                                                                                    • Instruction ID: ac844ef734d24c76dc9aa96f201b13a865b129e9c1b137beabd8cb6517960092
                                                                                    • Opcode Fuzzy Hash: 267c9eefe26e23fd4e765c6349420bb8bb9da3d18075eb1d96a464b655a4fe2f
                                                                                    • Instruction Fuzzy Hash: F931D271A00254AFEB01EFA5DD52E6EBBB8EB09304F9144BAF804E3291D73C9D10CB58
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 0042948A
                                                                                    • GetTextMetricsA.GDI32(00000000), ref: 00429493
                                                                                      • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 004294A2
                                                                                    • GetTextMetricsA.GDI32(00000000,?), ref: 004294AF
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 004294B6
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 004294BE
                                                                                    • GetSystemMetrics.USER32(00000006), ref: 004294E3
                                                                                    • GetSystemMetrics.USER32(00000006), ref: 004294FD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Metrics$ObjectSelectSystemText$CreateFontIndirectRelease
                                                                                    • String ID:
                                                                                    • API String ID: 1583807278-0
                                                                                    • Opcode ID: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
                                                                                    • Instruction ID: 8a5b62ad3b2811282b00f4aa11bc4c2c065e9b9ae855548013837f5c18493421
                                                                                    • Opcode Fuzzy Hash: 960ca5b6b9ec06081429caf0e2ae16fd4423d047ce8cb1d090ce01a2b2c84894
                                                                                    • Instruction Fuzzy Hash: 0F01C4A17087103BE321767A9CC6F6F65C8DB44358F84043BF686D63D3D96C9C41866A
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 0041DE27
                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041DE31
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041DE3E
                                                                                    • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DE4D
                                                                                    • GetStockObject.GDI32(00000007), ref: 0041DE5B
                                                                                    • GetStockObject.GDI32(00000005), ref: 0041DE67
                                                                                    • GetStockObject.GDI32(0000000D), ref: 0041DE73
                                                                                    • LoadIconA.USER32(00000000,00007F00), ref: 0041DE84
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ObjectStock$CapsDeviceIconLoadRelease
                                                                                    • String ID:
                                                                                    • API String ID: 225703358-0
                                                                                    • Opcode ID: 93123cf7b7da28845296a778695a34f9ae7968dfa7e72d2685fd09fde09bf652
                                                                                    • Instruction ID: 282f56568f1177e4dad385ec7f61a974d29090d827cf1f87eb40c920fa9ca7e8
                                                                                    • Opcode Fuzzy Hash: 93123cf7b7da28845296a778695a34f9ae7968dfa7e72d2685fd09fde09bf652
                                                                                    • Instruction Fuzzy Hash: 4C1142706457015EE340BFA66E52B6A36A4D725708F40413FF609AF3D1D77A2C448B9E
                                                                                    APIs
                                                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 00463344
                                                                                    • SetCursor.USER32(00000000,00000000,00007F02,00000000,004633D9), ref: 0046334A
                                                                                    • SetCursor.USER32(?,004633C1,00007F02,00000000,004633D9), ref: 004633B4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Cursor$Load
                                                                                    • String ID: $ $Internal error: Item already expanding
                                                                                    • API String ID: 1675784387-1948079669
                                                                                    • Opcode ID: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                                                                                    • Instruction ID: e4e85f4aa3fa623d7d3a169fbc538aa22306e9421cedfdc69a3031d12d347dae
                                                                                    • Opcode Fuzzy Hash: 040729a671edf880b94918ceea5f8eaec20fdfbf8da854279a56862745118dff
                                                                                    • Instruction Fuzzy Hash: 4CB18270604284EFDB11DF29C545B9ABBF1BF04305F1484AAE8469B792DB78EE44CB4A
                                                                                    APIs
                                                                                    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00453E17
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: PrivateProfileStringWrite
                                                                                    • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                                                                    • API String ID: 390214022-3304407042
                                                                                    • Opcode ID: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
                                                                                    • Instruction ID: 4c4b1d7f09994941c57eaafc4db68242d6a3f6c21ecd3f2b5b8f846a746055a2
                                                                                    • Opcode Fuzzy Hash: 262666494607197906d7283235c4c76affd32b2b0fdb9ef9cba9b9ea75353bac
                                                                                    • Instruction Fuzzy Hash: 40911434E002099BDB01EFA5D842BDEB7F5AF4874AF608466E90077392D7786E49CB58
                                                                                    APIs
                                                                                    • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 00476CA9
                                                                                    • SetWindowLongW.USER32(00000000,000000FC,00476C04), ref: 00476CD0
                                                                                    • GetACP.KERNEL32(00000000,00476EE8,?,00000000,00476F12), ref: 00476D0D
                                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00476D53
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ClassInfoLongMessageSendWindow
                                                                                    • String ID: COMBOBOX$Inno Setup: Language
                                                                                    • API String ID: 3391662889-4234151509
                                                                                    • Opcode ID: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
                                                                                    • Instruction ID: b13fa11fcbd9abdf7db93726dac51e4442bd67f198c8610d2c1064f44be53319
                                                                                    • Opcode Fuzzy Hash: 1db359e320ab2741222256d54ad499686456584f5ec697b8868a090b3fdd66eb
                                                                                    • Instruction Fuzzy Hash: 46812C346006059FDB10DF69D985AEAB7F2FB09304F15C1BAE808EB762D778AD41CB58
                                                                                    APIs
                                                                                    • GetSystemDefaultLCID.KERNEL32(00000000,00408968,?,?,?,?,00000000,00000000,00000000,?,0040996F,00000000,00409982), ref: 0040873A
                                                                                      • Part of subcall function 00408568: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0049B4C0,00000001,?,00408633,?,00000000,00408712), ref: 00408586
                                                                                      • Part of subcall function 004085B4: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004087B6,?,?,?,00000000,00408968), ref: 004085C7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoLocale$DefaultSystem
                                                                                    • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                                                                    • API String ID: 1044490935-665933166
                                                                                    • Opcode ID: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                                                                                    • Instruction ID: 5c6fde8006682913ecab3173e7335377554a92ac61a87523d81808753b4ec1a9
                                                                                    • Opcode Fuzzy Hash: 99a58aab46255149f4b24f4520dbd6929c7443738739b227c4cc8c7d24f61a81
                                                                                    • Instruction Fuzzy Hash: 7D516C24B00108ABDB01FBA69E4169EB7A9DB94308F50C07FA181BB3C3CE3DDA05975D
                                                                                    APIs
                                                                                    • GetVersion.KERNEL32(00000000,004118F9), ref: 0041178C
                                                                                    • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 0041184A
                                                                                      • Part of subcall function 00411AAC: CreatePopupMenu.USER32 ref: 00411AC6
                                                                                    • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 004118D6
                                                                                      • Part of subcall function 00411AAC: CreateMenu.USER32 ref: 00411AD0
                                                                                    • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 004118BD
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                    • String ID: ,$?
                                                                                    • API String ID: 2359071979-2308483597
                                                                                    • Opcode ID: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
                                                                                    • Instruction ID: ecf66c9774bccec907b621c371347452b74b7622051e058d8a4a73451c3e974f
                                                                                    • Opcode Fuzzy Hash: 4986dcd06abefbee5f666d79fc26290c702fe8a84b14e195092edf3558bd7871
                                                                                    • Instruction Fuzzy Hash: D7510674A00245ABDB10EF6ADC816EA7BF9AF09304B11857BF904E73A6D738DD41CB58
                                                                                    APIs
                                                                                    • GetObjectA.GDI32(?,00000018,?), ref: 0041BF28
                                                                                    • GetObjectA.GDI32(?,00000018,?), ref: 0041BF37
                                                                                    • GetBitmapBits.GDI32(?,?,?), ref: 0041BF88
                                                                                    • GetBitmapBits.GDI32(?,?,?), ref: 0041BF96
                                                                                    • DeleteObject.GDI32(?), ref: 0041BF9F
                                                                                    • DeleteObject.GDI32(?), ref: 0041BFA8
                                                                                    • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BFC5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Object$BitmapBitsDelete$CreateIcon
                                                                                    • String ID:
                                                                                    • API String ID: 1030595962-0
                                                                                    • Opcode ID: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                                                                                    • Instruction ID: 74cae3b7aa7aab4ce12a2fbd062d204c5c4082198076ec6df892ad84fd278e80
                                                                                    • Opcode Fuzzy Hash: dabea464bc85c36b4411cc83672e19ff5768c85fc4c65aec36842f1966395034
                                                                                    • Instruction Fuzzy Hash: 6A510671A002199FCB10DFA9C9819EEB7F9EF48314B11416AF914E7395D738AD41CB68
                                                                                    APIs
                                                                                    • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CEFE
                                                                                    • GetDeviceCaps.GDI32(00000000,00000026), ref: 0041CF1D
                                                                                    • SelectPalette.GDI32(?,?,00000001), ref: 0041CF83
                                                                                    • RealizePalette.GDI32(?), ref: 0041CF92
                                                                                    • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CFFC
                                                                                    • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041D03A
                                                                                    • SelectPalette.GDI32(?,?,00000001), ref: 0041D05F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: PaletteStretch$Select$BitsCapsDeviceModeRealize
                                                                                    • String ID:
                                                                                    • API String ID: 2222416421-0
                                                                                    • Opcode ID: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                                                                                    • Instruction ID: 4b814cf558339e083a7fb5ccd56fb4ffad9fd0a27a4bfdacf16c2dd2476febac
                                                                                    • Opcode Fuzzy Hash: 5be0e4e6833feb243a8d388dd1011de92277052336d3d318ec39d49e9b6efc72
                                                                                    • Instruction Fuzzy Hash: D2515EB0604200AFDB14DFA8C985F9BBBE9EF08304F10459AB549DB292C778ED81CB58
                                                                                    APIs
                                                                                    • SendMessageA.USER32(00000000,?,?), ref: 0045732E
                                                                                      • Part of subcall function 0042427C: GetWindowTextA.USER32(?,?,00000100), ref: 0042429C
                                                                                      • Part of subcall function 0041EEA4: GetCurrentThreadId.KERNEL32 ref: 0041EEF3
                                                                                      • Part of subcall function 0041EEA4: EnumThreadWindows.USER32(00000000,0041EE54,00000000), ref: 0041EEF9
                                                                                      • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                    • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00457395
                                                                                    • TranslateMessage.USER32(?), ref: 004573B3
                                                                                    • DispatchMessageA.USER32(?), ref: 004573BC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Message$TextThreadWindow$CurrentDispatchEnumSendTranslateWindows
                                                                                    • String ID: [Paused]
                                                                                    • API String ID: 1007367021-4230553315
                                                                                    • Opcode ID: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
                                                                                    • Instruction ID: a72840e20965590be0df7748d4dcd1bfe023db3bc5775872eefead19b10ec59e
                                                                                    • Opcode Fuzzy Hash: 138259db96aaba9c66cb09bcf6582550d327018b684ee04c4d651f5f89e9d65e
                                                                                    • Instruction Fuzzy Hash: 633175319082449ADB11DBB9EC81B9E7FB8EF49314F5540B7EC00E7292D73C9909DB69
                                                                                    APIs
                                                                                    • GetCursor.USER32(00000000,0046B55F), ref: 0046B4DC
                                                                                    • LoadCursorA.USER32(00000000,00007F02), ref: 0046B4EA
                                                                                    • SetCursor.USER32(00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4F0
                                                                                    • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B4FA
                                                                                    • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,0046B55F), ref: 0046B500
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Cursor$LoadSleep
                                                                                    • String ID: CheckPassword
                                                                                    • API String ID: 4023313301-1302249611
                                                                                    • Opcode ID: 301d54e166a0b4011b0937e4b70ed1e1b4ade500f65d2603abaf2adc357acc1d
                                                                                    • Instruction ID: 9465d4cba05e43c3341d6d018928b45656d3fee3f016636846a90655da25d4f4
                                                                                    • Opcode Fuzzy Hash: 301d54e166a0b4011b0937e4b70ed1e1b4ade500f65d2603abaf2adc357acc1d
                                                                                    • Instruction Fuzzy Hash: D0316334740204AFD711EF69C899B9A7BE4EF45308F5580B6F9049B3A2D7789E40CB99
                                                                                    APIs
                                                                                      • Part of subcall function 00477B94: GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
                                                                                      • Part of subcall function 00477B94: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
                                                                                      • Part of subcall function 00477B94: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
                                                                                    • SendMessageA.USER32(00000000,0000004A,00000000,00478026), ref: 00477CA1
                                                                                    • GetTickCount.KERNEL32 ref: 00477CE6
                                                                                    • GetTickCount.KERNEL32 ref: 00477CF0
                                                                                    • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 00477D45
                                                                                    Strings
                                                                                    • CallSpawnServer: Unexpected status: %d, xrefs: 00477D2E
                                                                                    • CallSpawnServer: Unexpected response: $%x, xrefs: 00477CD6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountTick$AddressHandleMessageModuleMultipleObjectsProcProcessSendThreadWaitWindow
                                                                                    • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                                                                    • API String ID: 613034392-3771334282
                                                                                    • Opcode ID: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
                                                                                    • Instruction ID: 262cbc5b9954910938d5a1e8e32dc50db46ad6f301169d9d39307b56b522dac3
                                                                                    • Opcode Fuzzy Hash: a349fc6668a2a279a7709dc0d92d626649643492524c5ed72309cd5f58a9f2ee
                                                                                    • Instruction Fuzzy Hash: 87318474B042159EDB10EBB9C8867EE76A0AF08714F90807AB548EB392D67C9D4187AD
                                                                                    APIs
                                                                                    • GetProcAddress.KERNEL32(626D6573,CreateAssemblyCache), ref: 0045983F
                                                                                    Strings
                                                                                    • Fusion.dll, xrefs: 004597DF
                                                                                    • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 0045984A
                                                                                    • CreateAssemblyCache, xrefs: 00459836
                                                                                    • Failed to load .NET Framework DLL "%s", xrefs: 00459824
                                                                                    • .NET Framework CreateAssemblyCache function failed, xrefs: 00459862
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                                                                    • API String ID: 190572456-3990135632
                                                                                    • Opcode ID: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
                                                                                    • Instruction ID: 9a538673283cb431493768ab67eac729fe35d93f11f945e2dcd414e2b3f175b6
                                                                                    • Opcode Fuzzy Hash: 64b7f7115ec2050a4f0e42ab113808549d669c8acfba7d9bf3bad921683fe547
                                                                                    • Instruction Fuzzy Hash: A2318B70E10649ABCB10FFA5C88169EB7B8EF45315F50857BE814E7382DB389E08C799
                                                                                    APIs
                                                                                      • Part of subcall function 0041C048: GetObjectA.GDI32(?,00000018), ref: 0041C055
                                                                                    • GetFocus.USER32 ref: 0041C168
                                                                                    • GetDC.USER32(?), ref: 0041C174
                                                                                    • SelectPalette.GDI32(?,?,00000000), ref: 0041C195
                                                                                    • RealizePalette.GDI32(?), ref: 0041C1A1
                                                                                    • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C1B8
                                                                                    • SelectPalette.GDI32(?,00000000,00000000), ref: 0041C1E0
                                                                                    • ReleaseDC.USER32(?,?), ref: 0041C1ED
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Palette$Select$BitsFocusObjectRealizeRelease
                                                                                    • String ID:
                                                                                    • API String ID: 3303097818-0
                                                                                    • Opcode ID: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                                                                                    • Instruction ID: 25a0b6576c779426e59073023ceed4ef49f3845c1b310514cd4f08ef327de147
                                                                                    • Opcode Fuzzy Hash: 26117fda3ddcda01a6cc84f42a4f6ec069d0e010bd6cdd98afb854c6c7779a8d
                                                                                    • Instruction Fuzzy Hash: 49116D71A44604BFDF10DBE9CC81FAFB7FCEB48700F50486AB518E7281DA7899008B28
                                                                                    APIs
                                                                                    • GetSystemMetrics.USER32(0000000E), ref: 00418C70
                                                                                    • GetSystemMetrics.USER32(0000000D), ref: 00418C78
                                                                                    • 6F522980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C7E
                                                                                      • Part of subcall function 004107F8: 6F51C400.COMCTL32(0049B628,000000FF,00000000,00418CAC,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 004107FC
                                                                                    • 6F58CB00.COMCTL32(0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418CCE
                                                                                    • 6F58C740.COMCTL32(00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418CD9
                                                                                    • 6F58CB00.COMCTL32(0049B628,00000001,?,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000), ref: 00418CEC
                                                                                    • 6F520860.COMCTL32(0049B628,00418D0F,?,00000000,?,0049B628,00000000,00000000,00000000,00000000,00418D08,?,00000000,0000000D,00000000,0000000E), ref: 00418D02
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem$C400C740F520860F522980
                                                                                    • String ID:
                                                                                    • API String ID: 2856677924-0
                                                                                    • Opcode ID: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                                                                                    • Instruction ID: f48c8f8e6a400555c090207229051c9eae11b8a9b20c4da93df477ea8fa1a9e8
                                                                                    • Opcode Fuzzy Hash: e2c7fe5230f8d2f143d47c0d6a7892a097693e1c100db4317caf46c6149257f7
                                                                                    • Instruction Fuzzy Hash: 6B112475744204BBDB50EBA9EC82FAD73F8DB08704F504066B514EB2C1DAB9AD808759
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegCloseKey.ADVAPI32(?,?,00000001,00000000,00000000,00483D24), ref: 00483D09
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpen
                                                                                    • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                                                                    • API String ID: 47109696-2530820420
                                                                                    • Opcode ID: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
                                                                                    • Instruction ID: 212569cff1cfb7858b589fbdbabdc9c693f1f7cc945fcf11155ec0ddb5f1f406
                                                                                    • Opcode Fuzzy Hash: e1bcbbbaaee85d585434023fd650e6813b785c41e8fbc068ac73575afb55ee56
                                                                                    • Instruction Fuzzy Hash: CC117C30704244AADB10FF65D862B5E7BF9DB45B05F618877A800E7282EB78AE05875C
                                                                                    APIs
                                                                                    • SelectObject.GDI32(00000000,?), ref: 0041B470
                                                                                    • SelectObject.GDI32(?,00000000), ref: 0041B47F
                                                                                    • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B4AB
                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 0041B4B9
                                                                                    • SelectObject.GDI32(?,00000000), ref: 0041B4C7
                                                                                    • DeleteDC.GDI32(00000000), ref: 0041B4D0
                                                                                    • DeleteDC.GDI32(?), ref: 0041B4D9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ObjectSelect$Delete$Stretch
                                                                                    • String ID:
                                                                                    • API String ID: 1458357782-0
                                                                                    • Opcode ID: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                    • Instruction ID: 052e9154069abc57648b404522aaf552eddfcc6d95cd3388d63b7ef9ce004286
                                                                                    • Opcode Fuzzy Hash: 8542cbb8adbe0fd8af4a730cfe3faeef428ae57c020086fb9cb954466ea4b08d
                                                                                    • Instruction Fuzzy Hash: 7B115C72E40619ABDB10DAD9DC86FEFB7BCEF08704F144555B614F7282C678AC418BA8
                                                                                    APIs
                                                                                    • GetCursorPos.USER32 ref: 004233AF
                                                                                    • WindowFromPoint.USER32(?,?), ref: 004233BC
                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004233CA
                                                                                    • GetCurrentThreadId.KERNEL32 ref: 004233D1
                                                                                    • SendMessageA.USER32(00000000,00000084,?,?), ref: 004233EA
                                                                                    • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423401
                                                                                    • SetCursor.USER32(00000000), ref: 00423413
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                    • String ID:
                                                                                    • API String ID: 1770779139-0
                                                                                    • Opcode ID: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                    • Instruction ID: 22bb490dc700fc35bbf8fe9eba0271ced42fa0644d0760cf779c582944844a3d
                                                                                    • Opcode Fuzzy Hash: 134875e674979cd567c136abb418dc525a6250aa5b529fa10794d0eebf3240cc
                                                                                    • Instruction Fuzzy Hash: BA01D4223046103AD6217B755D82E2F26E8DB85B15F50407FF504BB283DA3D9D11937D
                                                                                    APIs
                                                                                    • RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                    • LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                    • RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                                                                    • String ID: 4dtd$`c
                                                                                    • API String ID: 730355536-339694905
                                                                                    • Opcode ID: 303ccfa916ee30606edfd417ee1dfeae8d79d4aa2781d0ec5268568314661242
                                                                                    • Instruction ID: 91310e2de28581c92a9b529d79901d52005bdf0b1253609ef7109df0d78d257f
                                                                                    • Opcode Fuzzy Hash: 303ccfa916ee30606edfd417ee1dfeae8d79d4aa2781d0ec5268568314661242
                                                                                    • Instruction Fuzzy Hash: D001A1706482409EE719AB69BA467253FD4D795B48F11803BF840A6BF3C77C4440EBAD
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(user32.dll), ref: 0049533C
                                                                                    • GetProcAddress.KERNEL32(00000000,MonitorFromRect), ref: 00495349
                                                                                    • GetProcAddress.KERNEL32(00000000,GetMonitorInfoA), ref: 00495356
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule
                                                                                    • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                                                                    • API String ID: 667068680-2254406584
                                                                                    • Opcode ID: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
                                                                                    • Instruction ID: d6622564654ba01390171a2dbbf88ec7785202fdd48675fe733a6c53722864ad
                                                                                    • Opcode Fuzzy Hash: 5579b8dc187442e7c517f6558358e9e0fd6dcc5405420102cd7b083255a2d8af
                                                                                    • Instruction Fuzzy Hash: 7EF0F692741F156ADA3121660C41B7F6B8CCB917B1F240137BE44A7382E9ED8C0047ED
                                                                                    APIs
                                                                                    • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressInit), ref: 0045D691
                                                                                    • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompress), ref: 0045D6A1
                                                                                    • GetProcAddress.KERNEL32(00000000,BZ2_bzDecompressEnd), ref: 0045D6B1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc
                                                                                    • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                                                                    • API String ID: 190572456-212574377
                                                                                    • Opcode ID: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                                                                                    • Instruction ID: 26f5c6c79611f6cc0facecefa5b4932716cc5d8e9f8ea2477ead0514974f6e87
                                                                                    • Opcode Fuzzy Hash: 0c00d940adfee3eed657d73ca32928dd6beaef8d72542be6af97d79d08c28db7
                                                                                    • Instruction Fuzzy Hash: 0EF01DB0D00705DFD724EFB6ACC672736D5AB6831AF50813B990E95262D778045ACF2C
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002,00000000,004812C8), ref: 0042EA35
                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EA3B
                                                                                    • InterlockedExchange.KERNEL32(0049B668,00000001), ref: 0042EA4C
                                                                                      • Part of subcall function 0042E9AC: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                                                                                      • Part of subcall function 0042E9AC: GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                                                                                      • Part of subcall function 0042E9AC: InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                                                                                    • ChangeWindowMessageFilterEx.USER32(00000000,?,00000001,00000000,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042EA60
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressExchangeHandleInterlockedModuleProc$ChangeFilterMessageWindow
                                                                                    • String ID: ChangeWindowMessageFilterEx$user32.dll
                                                                                    • API String ID: 142928637-2676053874
                                                                                    • Opcode ID: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                                                                                    • Instruction ID: 20967f7a279d57b19857f2ad39d34e10c6be6de8430a8d3efc5b40b14e24a4c3
                                                                                    • Opcode Fuzzy Hash: 2e6935975283b392abf6eb535232e6e33c7297ce4864da2c850d0b2669d54df9
                                                                                    • Instruction Fuzzy Hash: 99E092A1741B20EAEA10B7B67C86FAA2658EB1076DF500037F100A51F1C3BD1C80CE9E
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(oleacc.dll,?,0044F089), ref: 0044C7EB
                                                                                    • GetProcAddress.KERNEL32(00000000,LresultFromObject), ref: 0044C7FC
                                                                                    • GetProcAddress.KERNEL32(00000000,CreateStdAccessibleObject), ref: 0044C80C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                    • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                                                                    • API String ID: 2238633743-1050967733
                                                                                    • Opcode ID: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                                                                                    • Instruction ID: d6497c9818d993b67a5702c7731996643d684f189bbd4b702b1f6e54e13363b7
                                                                                    • Opcode Fuzzy Hash: 580db4225bb49e0f2395934ae602c4dd6ca827d8c76c18c7318a842ee4a54372
                                                                                    • Instruction Fuzzy Hash: 50F0DA70282305CAE750BBB5FDD57263694E3A470AF18277BE841551A2C7B94844CB8C
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,00498C24), ref: 00478C26
                                                                                    • GetProcAddress.KERNEL32(00000000,VerSetConditionMask), ref: 00478C33
                                                                                    • GetProcAddress.KERNEL32(00000000,VerifyVersionInfoW), ref: 00478C43
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$HandleModule
                                                                                    • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                                                                    • API String ID: 667068680-222143506
                                                                                    • Opcode ID: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
                                                                                    • Instruction ID: 32a0137ea675787c0bb1f7a77b9c903aea73f6d33f3aa717a8ad139b0a70eb03
                                                                                    • Opcode Fuzzy Hash: 81267d710db967c56e7e702a34d1e8b60bf08845a808e06a5f27e56110be3c01
                                                                                    • Instruction Fuzzy Hash: 4DC0C9F02C1700EEAA01B7B11DCAA7A255CC500728320843F7049BA182D97C0C104F3C
                                                                                    APIs
                                                                                    • GetFocus.USER32 ref: 0041B57E
                                                                                    • GetDC.USER32(?), ref: 0041B58A
                                                                                    • GetDeviceCaps.GDI32(?,00000068), ref: 0041B5A6
                                                                                    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5C3
                                                                                    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 0041B5DA
                                                                                    • ReleaseDC.USER32(?,?), ref: 0041B626
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: EntriesPaletteSystem$CapsDeviceFocusRelease
                                                                                    • String ID:
                                                                                    • API String ID: 2502006586-0
                                                                                    • Opcode ID: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                                                                                    • Instruction ID: 1753bd22f5710d4f749a3cf2d8329d0f84e6490acb09e3fae29671003709e3a5
                                                                                    • Opcode Fuzzy Hash: e956e6ae92597662ed98b2f51c6b506043ab8b509e5ceb21f610fa5f8f95298e
                                                                                    • Instruction Fuzzy Hash: D0410631A04258AFDF10DFA9C885AAFBBB4EF59704F1484AAF500EB351D3389D51CBA5
                                                                                    APIs
                                                                                    • SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                                                                                    • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045D184,?,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0F6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                                                                    • API String ID: 1452528299-1580325520
                                                                                    • Opcode ID: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                                                                                    • Instruction ID: 81e1e27ad3ae8d1ea1d6b81b4c13ff0be47bc54c17845d393ef4ad8e2f10c1e8
                                                                                    • Opcode Fuzzy Hash: 44daac30ba6290961f85a10f910adeebe56024b8db7d764ffa7b36a0de599fb3
                                                                                    • Instruction Fuzzy Hash: 2C117535A04608AFD731DA91C942B9EB6ADDF4470AF6040776D00572C3D67C5F0B992E
                                                                                    APIs
                                                                                    • GetSystemMetrics.USER32(0000000B), ref: 0041BDD5
                                                                                    • GetSystemMetrics.USER32(0000000C), ref: 0041BDDF
                                                                                    • GetDC.USER32(00000000), ref: 0041BDE9
                                                                                    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 0041BE10
                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0041BE1D
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0041BE56
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CapsDeviceMetricsSystem$Release
                                                                                    • String ID:
                                                                                    • API String ID: 447804332-0
                                                                                    • Opcode ID: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                                                                                    • Instruction ID: d5b995c8e3894394b735eabd433659eae54025482fea58e306a85006fdca5b97
                                                                                    • Opcode Fuzzy Hash: 3bdc6123dd6674b0137b7fef1a93c0b96d54f33e4692062cf67464f69f8f60e7
                                                                                    • Instruction Fuzzy Hash: E5212A74E04648AFEB00EFA9C941BEEB7B4EB48714F10846AF514B7690D7785940CB69
                                                                                    APIs
                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0047E766
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046CD49), ref: 0047E78C
                                                                                    • GetWindowLongA.USER32(?,000000EC), ref: 0047E79C
                                                                                    • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047E7BD
                                                                                    • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047E7D1
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047E7ED
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$Long$Show
                                                                                    • String ID:
                                                                                    • API String ID: 3609083571-0
                                                                                    • Opcode ID: ff63fb1e20feffedf8b27b7393a281f73df7108790e31fa3444cbd3f3be65d10
                                                                                    • Instruction ID: 463a5c2536fff799c7bf7cf61cbf8045bc8b98cac2b0bb45a0840e8ed8c25010
                                                                                    • Opcode Fuzzy Hash: ff63fb1e20feffedf8b27b7393a281f73df7108790e31fa3444cbd3f3be65d10
                                                                                    • Instruction Fuzzy Hash: 53010CB5641210ABEA00D769DE81F6637D8AB1C320F0943A6B959DF3E3C738EC408B49
                                                                                    APIs
                                                                                      • Part of subcall function 0041A6E0: CreateBrushIndirect.GDI32 ref: 0041A74B
                                                                                    • UnrealizeObject.GDI32(00000000), ref: 0041B27C
                                                                                    • SelectObject.GDI32(?,00000000), ref: 0041B28E
                                                                                    • SetBkColor.GDI32(?,00000000), ref: 0041B2B1
                                                                                    • SetBkMode.GDI32(?,00000002), ref: 0041B2BC
                                                                                    • SetBkColor.GDI32(?,00000000), ref: 0041B2D7
                                                                                    • SetBkMode.GDI32(?,00000001), ref: 0041B2E2
                                                                                      • Part of subcall function 0041A058: GetSysColor.USER32(?), ref: 0041A062
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                    • String ID:
                                                                                    • API String ID: 3527656728-0
                                                                                    • Opcode ID: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                    • Instruction ID: d03b18a2b949c207061bd18b8e5d47ed8ce294e6be165222704fda36eef26a4f
                                                                                    • Opcode Fuzzy Hash: 90af7722afa79acc590a6ee3060039fb524340e2cf7ce152cccbdcb584e8dbde
                                                                                    • Instruction Fuzzy Hash: 56F0CD756015009BDE00FFAAD9CBE4B3B989F043097048496B908DF187CA3CD8649B3A
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539AB
                                                                                    • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,!nI,_iu,?,00000000,004539F6), ref: 004539BB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateFileHandle
                                                                                    • String ID: !nI$.tmp$_iu
                                                                                    • API String ID: 3498533004-584216493
                                                                                    • Opcode ID: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                                                                                    • Instruction ID: 7da7e9bbb2667b7856572ae533a3071efe8e017fb0344d9459fa270775feb22d
                                                                                    • Opcode Fuzzy Hash: 1dee75e2bfc2da78c26475f080e8b0a4db6a1a73d39b0bf1d20dabbe4352c150
                                                                                    • Instruction Fuzzy Hash: 1831C5B0A00249ABCB11EF95D842B9EBBB4AF44345F20453AF810B73C2D7785F058B69
                                                                                    APIs
                                                                                      • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                    • ShowWindow.USER32(?,00000005,00000000,00497FC1,?,?,00000000), ref: 00497D92
                                                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                      • Part of subcall function 004072A8: SetCurrentDirectoryA.KERNEL32(00000000,?,00497DBA,00000000,00497F8D,?,?,00000005,00000000,00497FC1,?,?,00000000), ref: 004072B3
                                                                                      • Part of subcall function 0042D44C: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D4DA,?,?,?,00000001,?,0045607E,00000000,004560E6), ref: 0042D481
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                                                                    • String ID: .dat$.msg$IMsg$Uninstall
                                                                                    • API String ID: 3312786188-1660910688
                                                                                    • Opcode ID: f79b411802c9da3a9116882e1755ce4b3781acbc659f3f1c23c36e526850363e
                                                                                    • Instruction ID: abb28459e614be91aca1b68aa70fad33032f6e559e3bf784a216f74f74fa669e
                                                                                    • Opcode Fuzzy Hash: f79b411802c9da3a9116882e1755ce4b3781acbc659f3f1c23c36e526850363e
                                                                                    • Instruction Fuzzy Hash: 89314F34A14114AFCB00EF65DD9296E7BB5EF89314F91857AF800AB395DB38BD01CB68
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042EADA
                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EAE0
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042EB09
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressByteCharHandleModuleMultiProcWide
                                                                                    • String ID: ShutdownBlockReasonCreate$user32.dll
                                                                                    • API String ID: 828529508-2866557904
                                                                                    • Opcode ID: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                                                                                    • Instruction ID: 7e091cf0cf0c4dae12ae48626bdfb721f4796128e550bb25d34418d77cfbcdd5
                                                                                    • Opcode Fuzzy Hash: eb577c3347fbf9fd6a249885fcfc34f4074b2fa1c1d8d6afc25abb851ecf655c
                                                                                    • Instruction Fuzzy Hash: 70F0C8D034061136E620B57F5C82F7B598C8F94759F140436B109E62C2D96CA905426E
                                                                                    APIs
                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,00000001,00000000,000000FF,000000FF), ref: 00458028
                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00458049
                                                                                    • CloseHandle.KERNEL32(?,0045807C), ref: 0045806F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                                                                    • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                                                                    • API String ID: 2573145106-3235461205
                                                                                    • Opcode ID: f4b7924840392a1c056809c60f673386a353f05297e24ea8de8fb179b7d06f04
                                                                                    • Instruction ID: 2f0632834368beac7d1c7250186d6a5b4d0e74160b608b18ba1b2b0c741dc3d5
                                                                                    • Opcode Fuzzy Hash: f4b7924840392a1c056809c60f673386a353f05297e24ea8de8fb179b7d06f04
                                                                                    • Instruction Fuzzy Hash: 8101A231600204AFD710EBA98C02A5A73A8EB49B25F51407BFC10E73D3DE399E08965D
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042EA70,00000004,00499934,004571F1,00457594,00457148,00000000,00000B06,00000000,00000000,00000001,00000000,00000002), ref: 0042E9C2
                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042E9C8
                                                                                    • InterlockedExchange.KERNEL32(0049B660,00000001), ref: 0042E9D9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressExchangeHandleInterlockedModuleProc
                                                                                    • String ID: ChangeWindowMessageFilter$user32.dll
                                                                                    • API String ID: 3478007392-2498399450
                                                                                    • Opcode ID: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                                                                                    • Instruction ID: c922fa4e85abb1c6873f36dcd01b6443d81c66d6c3501223796626af46e79b09
                                                                                    • Opcode Fuzzy Hash: 3254194633b527647525dea76c004eb0f33bc99a9c522dc813bf1be520244ffe
                                                                                    • Instruction Fuzzy Hash: 5CE0ECB2740324EADA103B627E8AF663558E724B19F50043BF001751F1C7FD1C80CA9E
                                                                                    APIs
                                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 00477B9C
                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00477C93,0049C0A8,00000000), ref: 00477BAF
                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00477BB5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProcProcessThreadWindow
                                                                                    • String ID: AllowSetForegroundWindow$user32.dll
                                                                                    • API String ID: 1782028327-3855017861
                                                                                    • Opcode ID: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
                                                                                    • Instruction ID: d51ed2a8d8be4cb67b0f2e6afaff03014389f5b4c9f6752a27b175deb1fe6994
                                                                                    • Opcode Fuzzy Hash: 0c48b0152dcd94fde7082f0574e48419f86d5c04df14efc0ca492c8631bf730a
                                                                                    • Instruction Fuzzy Hash: D7D0C790248701B9D910B3F64D46E9F3A5D894471CB50C47BB418E61C5DA7CFD04893D
                                                                                    APIs
                                                                                    • BeginPaint.USER32(00000000,?), ref: 00416C52
                                                                                    • SaveDC.GDI32(?), ref: 00416C83
                                                                                    • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416D45), ref: 00416CE4
                                                                                    • RestoreDC.GDI32(?,?), ref: 00416D0B
                                                                                    • EndPaint.USER32(00000000,?,00416D4C,00000000,00416D45), ref: 00416D3F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                    • String ID:
                                                                                    • API String ID: 3808407030-0
                                                                                    • Opcode ID: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                                                                                    • Instruction ID: 8164e3b37c2b38cc39b91ef4074089abf19b8963c3e0e5cbd12a4ce3d65b1abe
                                                                                    • Opcode Fuzzy Hash: ad781fe6fb59047a66b80eb53a3f65b2019eba16d1c733f202b60e39d660354f
                                                                                    • Instruction Fuzzy Hash: A1415070A002049FCB14DBA9C585FAA77F9FF48304F1540AEE8459B362D778DD81CB58
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                                                                                    • Instruction ID: a833d86c80f2fb81cba799e3b93fc1891ddf3ebdd98a67124a25423b7ab76754
                                                                                    • Opcode Fuzzy Hash: b6913cb722474124f75cff2ee5949f067bbdde1b56a592e148b6496e85af3d5a
                                                                                    • Instruction Fuzzy Hash: 563132746057809FC320EF69C984B9BB7E8AF89354F04491EF9D5C3752C638E8818F19
                                                                                    APIs
                                                                                    • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429808
                                                                                    • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429837
                                                                                    • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 00429853
                                                                                    • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 0042987E
                                                                                    • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042989C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID:
                                                                                    • API String ID: 3850602802-0
                                                                                    • Opcode ID: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                                                                                    • Instruction ID: 8b65b0e689063cc909dba6714575951256d1ad54ff8cece17fd29570ea6901c2
                                                                                    • Opcode Fuzzy Hash: 399f588db94bb8b810bf5b46e1237ea7bfd7cbebe0e15a3dbf36720fb68daebb
                                                                                    • Instruction Fuzzy Hash: 6E219D707107057BEB10AB62DC82F5B7AECAB41708F54443EB501AB2D2DFB8AE418228
                                                                                    APIs
                                                                                    • GetSystemMetrics.USER32(0000000B), ref: 0041BBCA
                                                                                    • GetSystemMetrics.USER32(0000000C), ref: 0041BBD4
                                                                                    • GetDC.USER32(00000000), ref: 0041BC12
                                                                                    • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 0041BC59
                                                                                    • DeleteObject.GDI32(00000000), ref: 0041BC9A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: MetricsSystem$BitmapCreateDeleteObject
                                                                                    • String ID:
                                                                                    • API String ID: 1095203571-0
                                                                                    • Opcode ID: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                                                                                    • Instruction ID: 2a907a32995036c4e239f44386a828d3a2f1e7d44945ead90e55d18394f4d4ff
                                                                                    • Opcode Fuzzy Hash: d6ecec59309c4539c21f746b1d4641e0a999657a412e1d938322a226e3514674
                                                                                    • Instruction Fuzzy Hash: 5D315C70E00208EFDB04DFA5C941AAEB7F5EB48700F2084AAF514AB781D7789E40DB98
                                                                                    APIs
                                                                                      • Part of subcall function 0045D04C: SetLastError.KERNEL32(00000057,00000000,0045D118,?,?,?,?,00000000), ref: 0045D0B7
                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 00473665
                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,004736AC,?,?,0049C1E0,00000000), ref: 0047367B
                                                                                    Strings
                                                                                    • Failed to set permissions on registry key (%d)., xrefs: 0047368C
                                                                                    • Could not set permissions on the registry key because it currently does not exist., xrefs: 0047366F
                                                                                    • Setting permissions on registry key: %s\%s, xrefs: 0047362A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                                                                    • API String ID: 1452528299-4018462623
                                                                                    • Opcode ID: 2cd14b75b874af61ac3d45831295ca4897b993e1bd4af745d48f10d6dc1171d0
                                                                                    • Instruction ID: ad6b00cc897a6d1501f3fc6a2a631de3da5dc8c6e7b4eccdfad28332e4495c63
                                                                                    • Opcode Fuzzy Hash: 2cd14b75b874af61ac3d45831295ca4897b993e1bd4af745d48f10d6dc1171d0
                                                                                    • Instruction Fuzzy Hash: A121C870A046445FCB10DFA9C8826EEBBE4DF49319F50817BE408E7392D7785E098B6D
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                    • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                                                                    • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$AllocString
                                                                                    • String ID:
                                                                                    • API String ID: 262959230-0
                                                                                    • Opcode ID: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                                                                                    • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                                                                    • Opcode Fuzzy Hash: dcd45591e65b03bd276bb2a5b0fabad56ebf76f0c081827c2345b0a7b763a240
                                                                                    • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                                                                    APIs
                                                                                    • SelectPalette.GDI32(00000000,00000000,00000000), ref: 00414419
                                                                                    • RealizePalette.GDI32(00000000), ref: 00414421
                                                                                    • SelectPalette.GDI32(00000000,00000000,00000001), ref: 00414435
                                                                                    • RealizePalette.GDI32(00000000), ref: 0041443B
                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00414446
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Palette$RealizeSelect$Release
                                                                                    • String ID:
                                                                                    • API String ID: 2261976640-0
                                                                                    • Opcode ID: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                                                                                    • Instruction ID: 3cc421e061c7a323c9855e33cbe13bf4890882f9e8533d15179bd5f7679f66d2
                                                                                    • Opcode Fuzzy Hash: c9c8aa66f6917016d7555c0ac5b3df2d15848593dde74026b2272496f15e705b
                                                                                    • Instruction Fuzzy Hash: A2018F7520C3806AE600A63D8C85A9F6BED9FCA718F15446EF495DB282DA7AC8018765
                                                                                    APIs
                                                                                      • Part of subcall function 0041F074: GetActiveWindow.USER32 ref: 0041F077
                                                                                      • Part of subcall function 0041F074: GetCurrentThreadId.KERNEL32 ref: 0041F08C
                                                                                      • Part of subcall function 0041F074: EnumThreadWindows.USER32(00000000,Function_0001F050), ref: 0041F092
                                                                                      • Part of subcall function 004231A8: GetSystemMetrics.USER32(00000000), ref: 004231AA
                                                                                    • OffsetRect.USER32(?,?,?), ref: 00424DC9
                                                                                    • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424E8C
                                                                                    • OffsetRect.USER32(?,?,?), ref: 00424E9D
                                                                                      • Part of subcall function 00423564: GetCurrentThreadId.KERNEL32 ref: 00423579
                                                                                      • Part of subcall function 00423564: SetWindowsHookExA.USER32(00000003,00423520,00000000,00000000), ref: 00423589
                                                                                      • Part of subcall function 00423564: CreateThread.KERNEL32(00000000,000003E8,004234D0,00000000,00000000), ref: 004235AD
                                                                                      • Part of subcall function 00424B2C: SetTimer.USER32(00000000,00000001,?,004234B4), ref: 00424B47
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Thread$CurrentOffsetRectWindows$ActiveCreateDrawEnumHookMetricsSystemTextTimerWindow
                                                                                    • String ID: vLB
                                                                                    • API String ID: 1477829881-1797516613
                                                                                    • Opcode ID: af4d35ceb7da7411f9a909d8da5f62e109762c4c9dbecdeb02cfa42cc05a337b
                                                                                    • Instruction ID: 1a85cd152e58b5c2614c87f396891e2b5808bef0cf689969089b0637ec596c27
                                                                                    • Opcode Fuzzy Hash: af4d35ceb7da7411f9a909d8da5f62e109762c4c9dbecdeb02cfa42cc05a337b
                                                                                    • Instruction Fuzzy Hash: C5812675A003188FCB14DFA8D880ADEBBF4FF88314F50416AE905AB296E738AD45CF44
                                                                                    APIs
                                                                                    • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00407003
                                                                                    • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 0040707D
                                                                                    • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 004070D5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Enum$NameOpenResourceUniversal
                                                                                    • String ID: Z
                                                                                    • API String ID: 3604996873-1505515367
                                                                                    • Opcode ID: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                                                                                    • Instruction ID: 78f4b6eea80f90a9c0d6dbacb1000d6f5057f9b0a0312f2c839bfa0eabc808a5
                                                                                    • Opcode Fuzzy Hash: a9e747af3270ad6827a26b5e12e82ea9da9777e5f51a79d453bfa0d7b97e4fbe
                                                                                    • Instruction Fuzzy Hash: 14516470E04208AFDB11DF95C951AAFBBB9EF09304F1045BAE500BB3D1D778AE458B5A
                                                                                    APIs
                                                                                    • SetRectEmpty.USER32(?), ref: 0044D04E
                                                                                    • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044D079
                                                                                    • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044D101
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: DrawText$EmptyRect
                                                                                    • String ID:
                                                                                    • API String ID: 182455014-2867612384
                                                                                    • Opcode ID: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
                                                                                    • Instruction ID: ac611c4ae9e9b4e435f74cd3b872a097dcdbbef8ea8fa2dc8c743a2ef399c877
                                                                                    • Opcode Fuzzy Hash: 9cefa38d4a8adbc35dceb9fbd70f94003a2f7c245499b58eac7a7a86e34dc042
                                                                                    • Instruction Fuzzy Hash: 18517171E00248AFDB11DFA5C885BDEBBF8BF48308F18447AE845EB252D7789945CB64
                                                                                    APIs
                                                                                    • GetDC.USER32(00000000), ref: 0042EF9E
                                                                                      • Part of subcall function 0041A1E8: CreateFontIndirectA.GDI32(?), ref: 0041A2A7
                                                                                    • SelectObject.GDI32(?,00000000), ref: 0042EFC1
                                                                                    • ReleaseDC.USER32(00000000,?), ref: 0042F0A0
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateFontIndirectObjectReleaseSelect
                                                                                    • String ID: ...\
                                                                                    • API String ID: 3133960002-983595016
                                                                                    • Opcode ID: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
                                                                                    • Instruction ID: de545d42c11d103cbad381cc3223c2b5efa9fdb4a6e9ae4bb0445229962d8c70
                                                                                    • Opcode Fuzzy Hash: 174dea87e3c77845355dc2bffde9c2636390ac865bcfddee608935e642ca7c05
                                                                                    • Instruction Fuzzy Hash: 5A316370B00128AFDB11EB96D841BAEB7F8EB09348F90447BE410A7392D7785E49CA59
                                                                                    APIs
                                                                                    • GetFileAttributesA.KERNEL32(00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 00498280
                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000000,00000000,00498B60,00000000,00498306,?,?,00000000,0049B628), ref: 004982A9
                                                                                    • MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 004982C2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Attributes$Move
                                                                                    • String ID: isRS-%.3u.tmp
                                                                                    • API String ID: 3839737484-3657609586
                                                                                    • Opcode ID: 6425da845d9cf075168c9006b2f4cde8adeeb665172db9fe24e9d2d56fbf6a76
                                                                                    • Instruction ID: fc33356634acd7bce8b4c2965ae56e8bcff63ef6fc68eceab8a95db248f88364
                                                                                    • Opcode Fuzzy Hash: 6425da845d9cf075168c9006b2f4cde8adeeb665172db9fe24e9d2d56fbf6a76
                                                                                    • Instruction Fuzzy Hash: 0B216471E00609ABCF10EFA9C8819AFBBB8AF45714F10457FB814B72D1DB389E018A59
                                                                                    APIs
                                                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                                                                    • ExitProcess.KERNEL32 ref: 00404E0D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExitMessageProcess
                                                                                    • String ID: Error$Runtime error at 00000000
                                                                                    • API String ID: 1220098344-2970929446
                                                                                    • Opcode ID: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                                    • Instruction ID: e2df0dcbf1ce8e07228a8ae3c957e3f7be2bf5582065763199918d440bd3f461
                                                                                    • Opcode Fuzzy Hash: 4aa0907dffceb0697d192a833af99b379258e6819ee5eddde657f3822e72bbb6
                                                                                    • Instruction Fuzzy Hash: 8E219560A442414ADB11A779BA8571B3B91D7E5348F04817BE710A73E3C77C8C4487ED
                                                                                    APIs
                                                                                      • Part of subcall function 0042C804: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C828
                                                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                    • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 00456C50
                                                                                    • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00456C7D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                                                                    • String ID: LoadTypeLib$RegisterTypeLib
                                                                                    • API String ID: 1312246647-2435364021
                                                                                    • Opcode ID: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                                                                                    • Instruction ID: 3ed1135b8019c5f4588910a0035f5c9e1cabb82a18fedb82429c118dce795412
                                                                                    • Opcode Fuzzy Hash: 99adc2ab1761f2fa15f1ac99c5dc87c93e60f5f8f6cafab150dd189b668492eb
                                                                                    • Instruction Fuzzy Hash: 2911B430B00604AFDB02EFA6CD51A5EB7BDEB89705F5184B6FC44D3752DA389904CA24
                                                                                    APIs
                                                                                    • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 0045716E
                                                                                    • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 0045720B
                                                                                    Strings
                                                                                    • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 0045719A
                                                                                    • Failed to create DebugClientWnd, xrefs: 004571D4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend
                                                                                    • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                                                                    • API String ID: 3850602802-3720027226
                                                                                    • Opcode ID: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
                                                                                    • Instruction ID: a6ca84080c04e90ac639e3db27cd2c1e4b46fe4ea5f20cae781d9f83c3d7e460
                                                                                    • Opcode Fuzzy Hash: 3689ec14d1edae2f57f0a744906126f7255bff4f1947e1d6bbead030c2853570
                                                                                    • Instruction Fuzzy Hash: 1011E770248240AFD710AB69AC85B5FBBD89B54319F15407AFA849B383D7798C18C7AE
                                                                                    APIs
                                                                                      • Part of subcall function 004242C4: SetWindowTextA.USER32(?,00000000), ref: 004242DC
                                                                                    • GetFocus.USER32 ref: 00478757
                                                                                    • GetKeyState.USER32(0000007A), ref: 00478769
                                                                                    • WaitMessage.USER32(?,00000000,00478790,?,00000000,004787B7,?,?,00000001,00000000,?,?,?,00480402,00000000,004812C8), ref: 00478773
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FocusMessageStateTextWaitWindow
                                                                                    • String ID: Wnd=$%x
                                                                                    • API String ID: 1381870634-2927251529
                                                                                    • Opcode ID: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
                                                                                    • Instruction ID: f17a5035e7dee30901ec9a03c3a5a372f1d0714b29ccd98a4f066b2945bd060b
                                                                                    • Opcode Fuzzy Hash: c0ca7a1e78f0957e158d44939737d51478939e9ac1b0c689120181bc9166dade
                                                                                    • Instruction Fuzzy Hash: CE11C634A40244AFD704EF65DC49A9EBBF8EB49314F6184BFF409E7681DB386D00CA69
                                                                                    APIs
                                                                                    • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046E618
                                                                                    • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046E627
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Time$File$LocalSystem
                                                                                    • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                                                                    • API String ID: 1748579591-1013271723
                                                                                    • Opcode ID: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
                                                                                    • Instruction ID: 5dd65cae4c1adac9d47cc9ad6336eda1851498fedff4a8a979bd050f9c4a6815
                                                                                    • Opcode Fuzzy Hash: 93d3f9926fe1e9ec47fc0153e923e0389e011619b8f85a7a05f57e02ab74589b
                                                                                    • Instruction Fuzzy Hash: A81136A440C3909ED340DF2AC04432BBAE4AB99704F44892EF8C8C6381E779C848DBB7
                                                                                    APIs
                                                                                    • SetFileAttributesA.KERNEL32(00000000,00000020), ref: 00453F83
                                                                                      • Part of subcall function 00406F50: DeleteFileA.KERNEL32(00000000,0049B628,004986F1,00000000,00498746,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406F5B
                                                                                    • MoveFileA.KERNEL32(00000000,00000000), ref: 00453FA8
                                                                                      • Part of subcall function 0045349C: GetLastError.KERNEL32(00000000,00454031,00000005,00000000,00454066,?,?,00000000,0049B628,00000004,00000000,00000000,00000000,?,004983A5,00000000), ref: 0045349F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$AttributesDeleteErrorLastMove
                                                                                    • String ID: DeleteFile$MoveFile
                                                                                    • API String ID: 3024442154-139070271
                                                                                    • Opcode ID: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
                                                                                    • Instruction ID: b5871bee3d194af1fa843ac656f6d820fc0ba16d57580c91db5694710367c43f
                                                                                    • Opcode Fuzzy Hash: ad4ba0b838e9d5317ad6887f6d8cb75152b6b17696a4ed4ee46c007163692804
                                                                                    • Instruction Fuzzy Hash: AEF062716142045BD701FBA2D84266EA7ECDB8435EF60443BB900BB6C3DA3C9E094529
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004594A1,00000000,00459659,?,00000000,00000000,00000000), ref: 004593B1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpen
                                                                                    • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                                                                    • API String ID: 47109696-2631785700
                                                                                    • Opcode ID: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
                                                                                    • Instruction ID: 1950c6f853cc10ed35e504d9d8503a730f6ffd27dc9bba4e9fa27fab35675349
                                                                                    • Opcode Fuzzy Hash: be4fb59b900ee74e718d87cdc4fcd1eef43a9c564c0a5ec1af3f625bb6e6dd39
                                                                                    • Instruction Fuzzy Hash: 12F0AF31300110DBCB10EB9AD885B6F6299DB9931AF50503BF981DB293E73CCC168629
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C05
                                                                                    • RegCloseKey.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00483C28
                                                                                    Strings
                                                                                    • CSDVersion, xrefs: 00483BFC
                                                                                    • System\CurrentControlSet\Control\Windows, xrefs: 00483BD2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpenQueryValue
                                                                                    • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                                                                    • API String ID: 3677997916-1910633163
                                                                                    • Opcode ID: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
                                                                                    • Instruction ID: 1d850e848a14c5c59b8e95f13e5f63a8fb365af486cc5d6c9f9b701d22fca986
                                                                                    • Opcode Fuzzy Hash: 33fca6af7241f4b653fe53c350a6e88c669f1de2ef3da1c7a1752152dae0c121
                                                                                    • Instruction Fuzzy Hash: 56F03176E40208A6DF10EAD48C45BAFB3BCAB14B05F104967EA10F7280E678AB048B59
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00453B5A,00000000,00453BFD,?,?,00000000,00000000,00000000,00000000,00000000,?,00453FED,00000000), ref: 0042D90A
                                                                                    • GetProcAddress.KERNEL32(00000000,kernel32.dll), ref: 0042D910
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                                                                    • API String ID: 1646373207-4063490227
                                                                                    • Opcode ID: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                                                                                    • Instruction ID: 657275fb9dfacbe144619f02b172540cf2f0c5a6f4252bec6bd03a25d2dd35a2
                                                                                    • Opcode Fuzzy Hash: 3965e48138ab8598cb17ff311cd558fd433aca8a834515e354a81fb776e31baf
                                                                                    • Instruction Fuzzy Hash: A5E0DFE0B40B0122D70032BA1C82B6B108D4B84728F90053B3894E62D6DDBCD9840A6D
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042EAD0), ref: 0042EB62
                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0042EB68
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: ShutdownBlockReasonDestroy$user32.dll
                                                                                    • API String ID: 1646373207-260599015
                                                                                    • Opcode ID: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                                                                                    • Instruction ID: e1ec077e445c8734ae54db5ffdd633522f5c412f0b7fee52e54de0d29bb4c321
                                                                                    • Opcode Fuzzy Hash: 88ce12e330a2fc51ece58c284b54de3a76b504cb94a4c995bd1a3fb2c6ea0693
                                                                                    • Instruction Fuzzy Hash: A2D0C793311732665D10B1F73CD1EAB058C891527935404B7F515E5641D55DEC1115AD
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,00498BF2), ref: 0044F77F
                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 0044F785
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: NotifyWinEvent$user32.dll
                                                                                    • API String ID: 1646373207-597752486
                                                                                    • Opcode ID: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                                                                                    • Instruction ID: 5e946f17392c81a4f172a46fe169fb9a1f72c9003761a5edf28bd31acc2f1150
                                                                                    • Opcode Fuzzy Hash: f97c3de5cacafbf63d36e16939e29d51eb7e912e87a0fb2b79f6fc39cd446e20
                                                                                    • Instruction Fuzzy Hash: 59E012F0E417049AFF00BBB57B86B1A3A90E764719B00057FF414A6292DB7C481C4F9D
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,00498C48,00000001,00000000,00498C6C), ref: 00498972
                                                                                    • GetProcAddress.KERNEL32(00000000,user32.dll), ref: 00498978
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: DisableProcessWindowsGhosting$user32.dll
                                                                                    • API String ID: 1646373207-834958232
                                                                                    • Opcode ID: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
                                                                                    • Instruction ID: 34f838485a85c0df890c3e192e44216071158a5cea444d63bbc0a0b2480586ef
                                                                                    • Opcode Fuzzy Hash: 71af8591fbce5d4533a7188bae6238bebf63b2f5996384562a89c67780edd1c3
                                                                                    • Instruction Fuzzy Hash: 22B002C0651707589D5032FA0D06B3F48484C5276D728057F3414A51C6DD6C89115D3F
                                                                                    APIs
                                                                                      • Part of subcall function 0044B658: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044F775,00498BF2), ref: 0044B67F
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0044B697
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0044B6A9
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0044B6BB
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0044B6CD
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6DF
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0044B6F1
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0044B703
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0044B715
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0044B727
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0044B739
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0044B74B
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0044B75D
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0044B76F
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0044B781
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044B793
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0044B7A5
                                                                                      • Part of subcall function 0044B658: GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0044B7B7
                                                                                    • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00498C1A), ref: 00464603
                                                                                    • GetProcAddress.KERNEL32(00000000,shell32.dll), ref: 00464609
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                    • String ID: SHPathPrepareForWriteA$shell32.dll
                                                                                    • API String ID: 2238633743-2683653824
                                                                                    • Opcode ID: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                                                                                    • Instruction ID: ed4894befccbfeda2ad80f7d1b9e1cb4df1a551eae9986247d0c145e26b1cd95
                                                                                    • Opcode Fuzzy Hash: edc6f8ec64a36a5908760ff58e990ea99ea877eb638915fc896b3384d426fa6b
                                                                                    • Instruction Fuzzy Hash: DDB092D0A82740A4C90077F2985B90F2A4488A271EB10153B710476483EABC84100EAE
                                                                                    APIs
                                                                                    • FindNextFileA.KERNEL32(000000FF,?,00000000,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54), ref: 0047D7CC
                                                                                    • FindClose.KERNEL32(000000FF,0047D7F7,0047D7F0,?,?,?,?,00000000,0047D945,?,?,?,00000000,?,0047DA54,00000000), ref: 0047D7EA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Find$CloseFileNext
                                                                                    • String ID:
                                                                                    • API String ID: 2066263336-0
                                                                                    • Opcode ID: df8c12b404288ac1cc0f16a4307cfa19f630790b74cd409a531bdd723e619500
                                                                                    • Instruction ID: 2ce97de6e4eb512f8d4c2eb376340b964b0e691095a652a34be041e4083b4e02
                                                                                    • Opcode Fuzzy Hash: df8c12b404288ac1cc0f16a4307cfa19f630790b74cd409a531bdd723e619500
                                                                                    • Instruction Fuzzy Hash: 07813A74D0024D9FCF11EFA5CC91ADFBBB8EF49304F5080AAE908A7291D6399A46CF54
                                                                                    APIs
                                                                                      • Part of subcall function 0042EE30: GetTickCount.KERNEL32 ref: 0042EE36
                                                                                      • Part of subcall function 0042EC88: MoveFileExA.KERNEL32(00000000,00000000,00000001(MOVEFILE_REPLACE_EXISTING)), ref: 0042ECBD
                                                                                    • GetLastError.KERNEL32(00000000,00475721,?,?,0049C1E0,00000000), ref: 0047560A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CountErrorFileLastMoveTick
                                                                                    • String ID: $LoggedMsgBox returned an unexpected value. Assuming Cancel.$MoveFileEx
                                                                                    • API String ID: 2406187244-2685451598
                                                                                    • Opcode ID: b4e541c37b522712e9a51433fba2d6f7c47cca6c6c5b44fd3a0118cd85a505a9
                                                                                    • Instruction ID: cfe7f312216358cbd0971b398f0cafde252de4893b1317a5ce8d70824cf78b76
                                                                                    • Opcode Fuzzy Hash: b4e541c37b522712e9a51433fba2d6f7c47cca6c6c5b44fd3a0118cd85a505a9
                                                                                    • Instruction Fuzzy Hash: 4D418570A006099BDB10EFA5D882AEF77B5FF48314F508537E408BB395D7789A058BA9
                                                                                    APIs
                                                                                    • GetDesktopWindow.USER32 ref: 00413D46
                                                                                    • GetDesktopWindow.USER32 ref: 00413DFE
                                                                                      • Part of subcall function 00418EC0: 6F58C6F0.COMCTL32(?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EDC
                                                                                      • Part of subcall function 00418EC0: ShowCursor.USER32(00000001,?,00000000,00413FC3,00000000,004140D3,?,?,0049B628), ref: 00418EF9
                                                                                    • SetCursor.USER32(00000000,?,?,?,?,00413AF3,00000000,00413B06), ref: 00413E3C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CursorDesktopWindow$Show
                                                                                    • String ID:
                                                                                    • API String ID: 2074268717-0
                                                                                    • Opcode ID: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                                                                                    • Instruction ID: d0219f8535474b9b7e790bb207accfb6dce16a9ac66decbe361331da1304c66b
                                                                                    • Opcode Fuzzy Hash: 48e3412c1a46991eea637d4b1b247886da5b7466a2ee9d80c19fa9edf3c8b710
                                                                                    • Instruction Fuzzy Hash: 91412C75600210AFC710DF2AFA84B56B7E1EB65329B16817BE405CB365DB38DD81CF98
                                                                                    APIs
                                                                                    • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 00408A75
                                                                                    • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408AE4
                                                                                    • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408B7F
                                                                                    • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408BBE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: LoadString$FileMessageModuleName
                                                                                    • String ID:
                                                                                    • API String ID: 704749118-0
                                                                                    • Opcode ID: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                                                                                    • Instruction ID: 7d65b0a5aa49ad722f3f3263bbe29e3330acee4661d9e2153cfe083702b22da2
                                                                                    • Opcode Fuzzy Hash: ede814ba8b2c905ab74f80468cae56b5ab65d73ed59c96bbcc76a4520df8398d
                                                                                    • Instruction Fuzzy Hash: 1F3123716083849AD370EB65C945BDF77D89B85704F40483FB6C8E72D1EB7859048B6B
                                                                                    APIs
                                                                                    • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044E90D
                                                                                      • Part of subcall function 0044CF50: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044CF82
                                                                                    • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044E991
                                                                                      • Part of subcall function 0042BBB4: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BBC8
                                                                                    • IsRectEmpty.USER32(?), ref: 0044E953
                                                                                    • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044E976
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                                                                    • String ID:
                                                                                    • API String ID: 855768636-0
                                                                                    • Opcode ID: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
                                                                                    • Instruction ID: f7bad605b8f68185b4e834990bb8ca2287257270a928060092b59a923d315d7c
                                                                                    • Opcode Fuzzy Hash: a4575d285c62c1c56b7686ad69dfdc5ef60a631fed5d3d1fc0705a1474777ead
                                                                                    • Instruction Fuzzy Hash: E5114A71B0030067E650BA7B8C86B5B76C9AB88748F15083FB545EB387DE7DDD094299
                                                                                    APIs
                                                                                    • OffsetRect.USER32(?,?,00000000), ref: 00495988
                                                                                    • OffsetRect.USER32(?,00000000,?), ref: 004959A3
                                                                                    • OffsetRect.USER32(?,?,00000000), ref: 004959BD
                                                                                    • OffsetRect.USER32(?,00000000,?), ref: 004959D8
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: OffsetRect
                                                                                    • String ID:
                                                                                    • API String ID: 177026234-0
                                                                                    • Opcode ID: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
                                                                                    • Instruction ID: 9409249b62c1188f54b5b62e2685c04785358b71117f53a2337039625fc08c68
                                                                                    • Opcode Fuzzy Hash: e6cd63ab1267e2bef36e0ea42f4f89ffcc49fa5b03609306a0fb63f812f5ac90
                                                                                    • Instruction Fuzzy Hash: 1121AEB6700701AFDB00DE69CD81E5BB7DAEFC4350F248A2AF944C3249D638ED048761
                                                                                    APIs
                                                                                    • GetCursorPos.USER32 ref: 00417260
                                                                                    • SetCursor.USER32(00000000), ref: 004172A3
                                                                                    • GetLastActivePopup.USER32(?), ref: 004172CD
                                                                                    • GetForegroundWindow.USER32(?), ref: 004172D4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Cursor$ActiveForegroundLastPopupWindow
                                                                                    • String ID:
                                                                                    • API String ID: 1959210111-0
                                                                                    • Opcode ID: 0325eb73ca892009698aa7541b5e3073a06fcfb7bd7d3fb361e05756697ccdec
                                                                                    • Instruction ID: de3f0dc6b436800086b9427ec8ddd2ec86eeedce3a35093462374e80c8eda50e
                                                                                    • Opcode Fuzzy Hash: 0325eb73ca892009698aa7541b5e3073a06fcfb7bd7d3fb361e05756697ccdec
                                                                                    • Instruction Fuzzy Hash: C52183313086118AD720AFA9E945AE733F1EF44754B0544ABF8558B352DB3DDC82CB9E
                                                                                    APIs
                                                                                    • MulDiv.KERNEL32(?,00000008,?), ref: 004955F1
                                                                                    • MulDiv.KERNEL32(?,00000008,?), ref: 00495605
                                                                                    • MulDiv.KERNEL32(?,00000008,?), ref: 00495619
                                                                                    • MulDiv.KERNEL32(?,00000008,?), ref: 00495637
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                    • Instruction ID: b77f8f3c6746ea581d036ce488ab013aedd37a602364075716cddbfd1b85439e
                                                                                    • Opcode Fuzzy Hash: b0bc83cb44cddb6cfb83e9cff79c84a8c4632dee95d4fc6912c32f85648e17c5
                                                                                    • Instruction Fuzzy Hash: A5112E72604504ABCB40DEA9D8C4D9B7BECEF8D324B6441AAF908DB242D674ED408B68
                                                                                    APIs
                                                                                    • GetClassInfoA.USER32(00400000,0041F470,?), ref: 0041F4A1
                                                                                    • UnregisterClassA.USER32(0041F470,00400000), ref: 0041F4CA
                                                                                    • RegisterClassA.USER32(00499598), ref: 0041F4D4
                                                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F50F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                    • String ID:
                                                                                    • API String ID: 4025006896-0
                                                                                    • Opcode ID: f5329bc195fe8fc87e14c8434c73e300a75752ca243df2a436e9fb21fcb0b6a1
                                                                                    • Instruction ID: 7a0dc659497f48f9aad4428a0df7724adcaf244520b53866b591a9b3b5545ee4
                                                                                    • Opcode Fuzzy Hash: f5329bc195fe8fc87e14c8434c73e300a75752ca243df2a436e9fb21fcb0b6a1
                                                                                    • Instruction Fuzzy Hash: F6011B72240104AADA10EBACED81E9B33999729314B11423BB615E72A2D6399C558BAC
                                                                                    APIs
                                                                                    • WaitForInputIdle.USER32(?,00000032), ref: 00454FA8
                                                                                    • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00454FCA
                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00454FD9
                                                                                    • CloseHandle.KERNEL32(?,00455006,00454FFF,?,?,?,00000000,?,?,004551DB,?,?,?,00000044,00000000,00000000), ref: 00454FF9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                                                                    • String ID:
                                                                                    • API String ID: 4071923889-0
                                                                                    • Opcode ID: 8aa0dd6ec5a68f6f7641eb82506f7728cd0b20fc7582fe19e2ee2bc87ac6724f
                                                                                    • Instruction ID: ea90b2abd28d60bbe0c33bbe6d7a83e36ef454db8471bda6b5c19e9a906557d9
                                                                                    • Opcode Fuzzy Hash: 8aa0dd6ec5a68f6f7641eb82506f7728cd0b20fc7582fe19e2ee2bc87ac6724f
                                                                                    • Instruction Fuzzy Hash: B9012D31A006097FEB1097AA8C02F6FBBECDF49764F610127F904D72C2C5788D409A78
                                                                                    APIs
                                                                                    • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D027
                                                                                    • LoadResource.KERNEL32(00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58,0000000A,00000000), ref: 0040D041
                                                                                    • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?,?,0047CB58), ref: 0040D05B
                                                                                    • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A7C8,00400000,00000001,00000000,?,0040CF84,00000000,?,00000000,?), ref: 0040D065
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                    • String ID:
                                                                                    • API String ID: 3473537107-0
                                                                                    • Opcode ID: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                    • Instruction ID: ce77ce8360aa458f47a01e9b0563465317cd85cc21d7bcd45488e041df035c61
                                                                                    • Opcode Fuzzy Hash: f701ce4f04cb0ebdd1143b5585c75acb70ffd029a82b31343d3be87257736b7b
                                                                                    • Instruction Fuzzy Hash: 49F04F726056046F9B14EE59A881D5B77ECDE88268310013AF908E7286DA38DD018B68
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 004705F1
                                                                                    Strings
                                                                                    • Unsetting NTFS compression on file: %s, xrefs: 004705D7
                                                                                    • Failed to set NTFS compression state (%d)., xrefs: 00470602
                                                                                    • Setting NTFS compression on file: %s, xrefs: 004705BF
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                                                                    • API String ID: 1452528299-3038984924
                                                                                    • Opcode ID: 4a85a403c5f553919e8eb8264edf58c674aea38054a880eb2495f4adb197a451
                                                                                    • Instruction ID: 452327faed6fd823952186a677ff1a78a18aba12ee86070aec797b5412e08bdc
                                                                                    • Opcode Fuzzy Hash: 4a85a403c5f553919e8eb8264edf58c674aea38054a880eb2495f4adb197a451
                                                                                    • Instruction Fuzzy Hash: A5018B71D09248A6CB04D7AD94512DDBBE49F4D314F44C5FFE459D7342DB780A088B9E
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,00000000), ref: 0046FE45
                                                                                    Strings
                                                                                    • Unsetting NTFS compression on directory: %s, xrefs: 0046FE2B
                                                                                    • Failed to set NTFS compression state (%d)., xrefs: 0046FE56
                                                                                    • Setting NTFS compression on directory: %s, xrefs: 0046FE13
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast
                                                                                    • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                                                                    • API String ID: 1452528299-1392080489
                                                                                    • Opcode ID: 01501a136b81c39b7c411191948b84cc59583678e1d21d505a98b8108a1a9e37
                                                                                    • Instruction ID: 6c3eba688a3488f6cff2036d9eec8e6f632fba0cce39d579df3f4bd3b957a0ce
                                                                                    • Opcode Fuzzy Hash: 01501a136b81c39b7c411191948b84cc59583678e1d21d505a98b8108a1a9e37
                                                                                    • Instruction Fuzzy Hash: E5014421E0824856CB04D7ADE44129DBBA49F49304F4485BBA495E7253EB790A09879B
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegDeleteValueA.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000,0045B7D5), ref: 00455DD8
                                                                                    • RegCloseKey.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045B7AE,?,?,?,?,?,00000000), ref: 00455DE1
                                                                                    • RemoveFontResourceA.GDI32(00000000), ref: 00455DEE
                                                                                    • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00455E02
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseDeleteFontMessageNotifyOpenRemoveResourceSendValue
                                                                                    • String ID:
                                                                                    • API String ID: 4283692357-0
                                                                                    • Opcode ID: 53be27aa0997865f395f34354d63af882f7726c3d4a8d794711f16c86898bbe7
                                                                                    • Instruction ID: 71ccc6c4ad223293e5fa71c014565a1ca4f3f808124b73c5b0663eb55104ffd2
                                                                                    • Opcode Fuzzy Hash: 53be27aa0997865f395f34354d63af882f7726c3d4a8d794711f16c86898bbe7
                                                                                    • Instruction Fuzzy Hash: 57F0BEB174070036EA10B6BAAC4BF2B26CC8F54745F10883ABA00EF2C3D97CDC04962D
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$CountSleepTick
                                                                                    • String ID:
                                                                                    • API String ID: 2227064392-0
                                                                                    • Opcode ID: dfa0650b41a5fbb69b4da717be5ba207ba5450cdb50d9376c11a56b5a3797e8a
                                                                                    • Instruction ID: 56d8cd0ebf6ab4a4d31aad6ab38b951dee0ff9c0bbbb70c30f4e079d31b44593
                                                                                    • Opcode Fuzzy Hash: dfa0650b41a5fbb69b4da717be5ba207ba5450cdb50d9376c11a56b5a3797e8a
                                                                                    • Instruction Fuzzy Hash: C6E0ED6A30921149863131AE98CA6AF4D48CBC2324B28853FE08CE6283C89C4C0A867E
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB,00000000), ref: 0047820D
                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8,?,?,?,?,?,00498CDB), ref: 00478213
                                                                                    • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478235
                                                                                    • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,?,?,00000001,00000000,00000002,00000000,004812C8), ref: 00478246
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                                                    • String ID:
                                                                                    • API String ID: 215268677-0
                                                                                    • Opcode ID: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
                                                                                    • Instruction ID: 91f0679cb69370e855683a510bc75a037ced8834772831ea40795c83ba0b1c60
                                                                                    • Opcode Fuzzy Hash: 89672e1c1dad377db11468aaf314ccfc00159a4e206af17bba33db1213e8e157
                                                                                    • Instruction Fuzzy Hash: D8F037716447007BD600E6B58C81E5B73DCEB44354F04493E7E98C71C1DA78DC089776
                                                                                    APIs
                                                                                    • GetLastActivePopup.USER32(?), ref: 0042424C
                                                                                    • IsWindowVisible.USER32(?), ref: 0042425D
                                                                                    • IsWindowEnabled.USER32(?), ref: 00424267
                                                                                    • SetForegroundWindow.USER32(?), ref: 00424271
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                                                                    • String ID:
                                                                                    • API String ID: 2280970139-0
                                                                                    • Opcode ID: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
                                                                                    • Instruction ID: 2c5ff33fc315f6eb6fab431e1453bcb0e66c5aaaa6596e28cc8dc28fd0b03a53
                                                                                    • Opcode Fuzzy Hash: d317456c615bf9008b67529b06aff5f9fae4f5f479d94640f2b11ca0dbd6cbb7
                                                                                    • Instruction Fuzzy Hash: C7E0EC61B02672D6AE31FA7B2881A9F518C9D45BE434641EBBC04FB38ADB2CDC1141BD
                                                                                    APIs
                                                                                    • GlobalHandle.KERNEL32 ref: 0040626F
                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00406276
                                                                                    • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 0040627B
                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00406281
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Global$AllocHandleLockUnlock
                                                                                    • String ID:
                                                                                    • API String ID: 2167344118-0
                                                                                    • Opcode ID: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                    • Instruction ID: 5df08fd8dc2b017785a639aa93036e57be915985ffe03f20f856cac12e18577c
                                                                                    • Opcode Fuzzy Hash: cbc5b304f88c7a08b053d0b09bd11fc9f2d944e51c7d356257a26bde9ab667b0
                                                                                    • Instruction Fuzzy Hash: 0BB009C4810A01BEEC0473B24C0BE3F245CD88172C3904A6F3448BA183987C9C405A3A
                                                                                    APIs
                                                                                    • RegCloseKey.ADVAPI32(?,?,?,?,00000001,00000000,00000000,0047BB01,?,00000000,00000000,00000001,00000000,0047A4B5,?,00000000), ref: 0047A479
                                                                                    Strings
                                                                                    • Failed to parse "reg" constant, xrefs: 0047A480
                                                                                    • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 0047A2ED
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close
                                                                                    • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                                                                    • API String ID: 3535843008-1938159461
                                                                                    • Opcode ID: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
                                                                                    • Instruction ID: 25f2a786541cb687838a6194ffc4a73185deb9e5551b5ad8c851c0bf1152322b
                                                                                    • Opcode Fuzzy Hash: 05ee6b3b67afee6859f894b9066335fb286a048b1f35c691c8bdca609618c678
                                                                                    • Instruction Fuzzy Hash: 22817274E00108AFCB10DF95D485ADEBBF9AF88344F50817AE814B7392D739AE05CB99
                                                                                    APIs
                                                                                    • GetForegroundWindow.USER32(00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835C5
                                                                                    • SetActiveWindow.USER32(?,00000000,00483716,?,00000000,00483757,?,?,?,?,00000000,00000000,00000000,?,0046BD99), ref: 004835D7
                                                                                    Strings
                                                                                    • Will not restart Windows automatically., xrefs: 004836F6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window$ActiveForeground
                                                                                    • String ID: Will not restart Windows automatically.
                                                                                    • API String ID: 307657957-4169339592
                                                                                    • Opcode ID: ceb5e1da4dc76295146827fa9bc1951038eb8722099578625e3d3877b71a3664
                                                                                    • Instruction ID: 4bdce942002d158aae482430f0c171f92fa141a3e9c551c877f01fd154286bbb
                                                                                    • Opcode Fuzzy Hash: ceb5e1da4dc76295146827fa9bc1951038eb8722099578625e3d3877b71a3664
                                                                                    • Instruction Fuzzy Hash: 7F414870648240BFD321FF68DC92B6D3BE49718B09F6448B7E440573A2E37D9A059B1D
                                                                                    APIs
                                                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,004021FC), ref: 004020CB
                                                                                      • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                      • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                      • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                      • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$Enter$AllocInitializeLeaveLocal
                                                                                    • String ID: `c
                                                                                    • API String ID: 296031713-2598275076
                                                                                    • Opcode ID: f7415a2c64eb69b5f99dd9f286a1c89547b8feb56fb3c065f0e8b1d1766084a0
                                                                                    • Instruction ID: 30adadd309813d1a6846ca6b4958dbaac508113c784b73a5bb8d11bfdb372a30
                                                                                    • Opcode Fuzzy Hash: f7415a2c64eb69b5f99dd9f286a1c89547b8feb56fb3c065f0e8b1d1766084a0
                                                                                    • Instruction Fuzzy Hash: 3941E3B2E00304DFDB10CF69EE8521A77A4F7A8324B15417FD854A77E2D3789801DB88
                                                                                    APIs
                                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764B0
                                                                                    • SetFileTime.KERNEL32(?,00000000,00000000,?,?,?,?,00000000,00000000,004764DF,?,00000000,004764F0,?,00000000,00476539), ref: 004764C4
                                                                                    Strings
                                                                                    • Extracting temporary file: , xrefs: 004763EC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileTime$Local
                                                                                    • String ID: Extracting temporary file:
                                                                                    • API String ID: 791338737-4171118009
                                                                                    • Opcode ID: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
                                                                                    • Instruction ID: 173659db1c42fed311bbc77dc24fc0b62308bfde4479aaaaa113f8cb774a82d8
                                                                                    • Opcode Fuzzy Hash: a80e35328548893b295efc7472ac722154afa94c34651c27e26e6e8334cb8313
                                                                                    • Instruction Fuzzy Hash: 9541B670E00649AFCB01DFA5C892AAFBBB9EB09704F51847AF814A7291D7789905CB58
                                                                                    Strings
                                                                                    • Failed to proceed to next wizard page; aborting., xrefs: 0046CD24
                                                                                    • Failed to proceed to next wizard page; showing wizard., xrefs: 0046CD38
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                                                                    • API String ID: 0-1974262853
                                                                                    • Opcode ID: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
                                                                                    • Instruction ID: bcb3787111d781b294161d03010f6e791927551fc3c7e501f8e48cd77162cd73
                                                                                    • Opcode Fuzzy Hash: 7a25e1645a33cbe6e929f5c7beb1038c0aed19b3e354743701339651447d5c4b
                                                                                    • Instruction Fuzzy Hash: A531C430604204DFD711EB59D9C5BA977F5EB06304F5500BBF448AB392D7786E40CB49
                                                                                    APIs
                                                                                      • Part of subcall function 0042DE1C: RegOpenKeyExA.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,;H,?,00000001,?,?,00483BE3,?,00000001,00000000), ref: 0042DE38
                                                                                    • RegCloseKey.ADVAPI32(?,00478F7E,?,?,00000001,00000000,00000000,00478F99), ref: 00478F67
                                                                                    Strings
                                                                                    • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00478EF2
                                                                                    • %s\%s_is1, xrefs: 00478F10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseOpen
                                                                                    • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                                                                    • API String ID: 47109696-1598650737
                                                                                    • Opcode ID: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
                                                                                    • Instruction ID: 4b2a563bf9abf46f4fe3d7c32e0d4fce195dfbf5fea183d3e913b06dd9c9918d
                                                                                    • Opcode Fuzzy Hash: 4390143081fa1cbfc05a77ab89ffad6b83c856e6c2d55465ffb8b64579313e9f
                                                                                    • Instruction Fuzzy Hash: EC218070B44244AFDB11DBA9CC45A9EBBF9EB8D704F90847BE408E7381DB789D018B58
                                                                                    APIs
                                                                                    • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 004501FD
                                                                                    • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0045022E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExecuteMessageSendShell
                                                                                    • String ID: open
                                                                                    • API String ID: 812272486-2758837156
                                                                                    • Opcode ID: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                                                                                    • Instruction ID: 7f57506e0c07b49dd0b520b237e7736b759e9f4ed638734fb0c833ac5abbff07
                                                                                    • Opcode Fuzzy Hash: ea446b968c091deb5619fe0c64f284e9fafe3e6cb185d1fb8701354efc215884
                                                                                    • Instruction Fuzzy Hash: A1216074E00204AFDB10DFA9C896B9EBBF8EB44705F1081BAB404E7292D678DE45CA59
                                                                                    APIs
                                                                                    • ShellExecuteEx.SHELL32(0000003C), ref: 0045532C
                                                                                    • GetLastError.KERNEL32(0000003C,00000000,00455375,?,?,?), ref: 0045533D
                                                                                      • Part of subcall function 0042D8C4: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D8D7
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: DirectoryErrorExecuteLastShellSystem
                                                                                    • String ID: <
                                                                                    • API String ID: 893404051-4251816714
                                                                                    • Opcode ID: be62181711fdad770c23067a055a605ead6c89444dc6de91f0ff3b7559ccb240
                                                                                    • Instruction ID: 92df0b2f1231c5c49ece4c570041ef31d6ed92e86db86b93cafb864a5026e18c
                                                                                    • Opcode Fuzzy Hash: be62181711fdad770c23067a055a605ead6c89444dc6de91f0ff3b7559ccb240
                                                                                    • Instruction Fuzzy Hash: 172167B0600609ABDB10EF65C8926AE7BE8AF44355F54403AFC44E7291D7789E49CB98
                                                                                    APIs
                                                                                    • RtlEnterCriticalSection.KERNEL32(0049B420,00000000,)), ref: 004025C7
                                                                                    • RtlLeaveCriticalSection.KERNEL32(0049B420,0040263D), ref: 00402630
                                                                                      • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(0049B420,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                                                                      • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(0049B420,0049B420,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                                                                      • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,0049B420,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                                                                      • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(0049B420,00401A89,00000000,00401A82,?,?,0040222E,021FC7BC,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                                                                    • String ID: )
                                                                                    • API String ID: 2227675388-1084416617
                                                                                    • Opcode ID: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                                    • Instruction ID: 77bd95ba853a3ee3b707a504883d316aad751082ca23ba06a0d8aa2ba3da16af
                                                                                    • Opcode Fuzzy Hash: 09cf32ac568926239da630a480ec85c7fe0e44c3c7351229851fbcf18ccaddb2
                                                                                    • Instruction Fuzzy Hash: E11104317042046FEB15AB796F5962B6AD4D795758B24087FF404F33D2DABD8C02929C
                                                                                    APIs
                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 00496B69
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Window
                                                                                    • String ID: /INITPROCWND=$%x $@
                                                                                    • API String ID: 2353593579-4169826103
                                                                                    • Opcode ID: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
                                                                                    • Instruction ID: 88b10d18150c6b9811cea3f3864e76c9cf3cbfb68c265b437af87b1fefc14b87
                                                                                    • Opcode Fuzzy Hash: 065ab22c92abacbd348a857e8389b224364e1a84b4d72130b6d36c29b0d142f9
                                                                                    • Instruction Fuzzy Hash: A3117231A042489FDF01DBA4E855BAEBFE8EB49314F51847BE504E7292EB3CA905C658
                                                                                    APIs
                                                                                      • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                                                                      • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                                                                    • SysFreeString.OLEAUT32(?), ref: 004474C6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: String$AllocByteCharFreeMultiWide
                                                                                    • String ID: NIL Interface Exception$Unknown Method
                                                                                    • API String ID: 3952431833-1023667238
                                                                                    • Opcode ID: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                                                                                    • Instruction ID: eb0132878ffe7144b3db707554455947565e11d0cdd4dc78092451a8fec87e99
                                                                                    • Opcode Fuzzy Hash: eaaa5532a95bbaa63f0b72a9291e33775e11d622c6162567185e6fee38e986d8
                                                                                    • Instruction Fuzzy Hash: 8011B9706082089FEB10DFA58C52A6EBBBCEB09704F91407AF504F7681D77C9D01CB69
                                                                                    APIs
                                                                                    • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000,00496443), ref: 0049640E
                                                                                    • CloseHandle.KERNEL32(004964A8,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,000000FC,?,00496468,?,0049645C,00000000), ref: 00496425
                                                                                      • Part of subcall function 004962F8: GetLastError.KERNEL32(00000000,00496390,?,?,?,?), ref: 0049631C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseCreateErrorHandleLastProcess
                                                                                    • String ID: 0nI
                                                                                    • API String ID: 3798668922-794067871
                                                                                    • Opcode ID: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
                                                                                    • Instruction ID: 4379268ebcebee96409867e54b2437a6ba0b21f89d1dc4ba20584320bf55fb87
                                                                                    • Opcode Fuzzy Hash: 9f8f3e3bd8d813766f30c87d8e8bb38219208be6823d56de1360ae23e0f090d4
                                                                                    • Instruction Fuzzy Hash: 840182B1644248AFDB00EBD1DC42A9EBBACDF08704F51403AB904E7281D6785E008A2D
                                                                                    APIs
                                                                                    • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DD78
                                                                                    • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DDB8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value$EnumQuery
                                                                                    • String ID: Inno Setup: No Icons
                                                                                    • API String ID: 1576479698-2016326496
                                                                                    • Opcode ID: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                                                                                    • Instruction ID: 8d080c6700cf8453afd411d185ff7d2dd707f59376968ad674d2e7d16536e1ed
                                                                                    • Opcode Fuzzy Hash: 36a0b08f46d91d09f38f531e186592c2a543f82488f0210131226a48688c00be
                                                                                    • Instruction Fuzzy Hash: 1B012B33B55B7179FB3045256D01F7B57889B82B60F64013BF942EA2C0D6999C04936E
                                                                                    APIs
                                                                                    • SetFileAttributesA.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452EC3
                                                                                    • GetLastError.KERNEL32(00000000,?,00000000,00452EE9,?,?,-00000001,?), ref: 00452ECB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: AttributesErrorFileLast
                                                                                    • String ID: T$H
                                                                                    • API String ID: 1799206407-488339322
                                                                                    • Opcode ID: 164a1123582fd7f8b9629d9128a54c78742dfc935cb603b92947040143095295
                                                                                    • Instruction ID: d2ab7b9b66ca24062e77e49c95e81f13ab46b8af1b1b2eb811bbb53637dcbd2b
                                                                                    • Opcode Fuzzy Hash: 164a1123582fd7f8b9629d9128a54c78742dfc935cb603b92947040143095295
                                                                                    • Instruction Fuzzy Hash: 86F0F971A04204AB8B01DB7A9D4249EB7ECEB8A32171045BBFC04E3642E7B84E048558
                                                                                    APIs
                                                                                    • DeleteFileA.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 0045293F
                                                                                    • GetLastError.KERNEL32(00000000,00000000,00452965,?,-00000001,?), ref: 00452947
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: DeleteErrorFileLast
                                                                                    • String ID: T$H
                                                                                    • API String ID: 2018770650-488339322
                                                                                    • Opcode ID: 54a576a396afaa571a066345412aacc20c83a6c328a38e41dddb38150347ef46
                                                                                    • Instruction ID: a1d21d86fbcf93c7076efe682877c1f84c37cf58088428800e153654eea74c02
                                                                                    • Opcode Fuzzy Hash: 54a576a396afaa571a066345412aacc20c83a6c328a38e41dddb38150347ef46
                                                                                    • Instruction Fuzzy Hash: 05F0C2B2B04608ABDB01EFB59D414AEB7E8EB4E315B6045B7FC04E3742E6B85E148598
                                                                                    APIs
                                                                                    • RemoveDirectoryA.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E47
                                                                                    • GetLastError.KERNEL32(00000000,00000000,00452E6D,?,-00000001,00000000), ref: 00452E4F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: DirectoryErrorLastRemove
                                                                                    • String ID: T$H
                                                                                    • API String ID: 377330604-488339322
                                                                                    • Opcode ID: f20199e737e539a63e7b44ed2747663bd9db8366f39d7150388d1a26e91210d5
                                                                                    • Instruction ID: a8b2bafe79397aca91686f8656b478e2385adfe3b855dfce5f6cc0b9ba314abc
                                                                                    • Opcode Fuzzy Hash: f20199e737e539a63e7b44ed2747663bd9db8366f39d7150388d1a26e91210d5
                                                                                    • Instruction Fuzzy Hash: 70F0FC71A04708AFCF01EF759D4249EB7E8DB4E31575049B7FC14E3642E7785E048598
                                                                                    APIs
                                                                                      • Part of subcall function 0047D0CC: FreeLibrary.KERNEL32(74600000,00481A2F), ref: 0047D0E2
                                                                                      • Part of subcall function 0047CD9C: GetTickCount.KERNEL32 ref: 0047CDE6
                                                                                      • Part of subcall function 00457294: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 004572B3
                                                                                    • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,0049895B), ref: 00498059
                                                                                    • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,0049895B), ref: 0049805F
                                                                                    Strings
                                                                                    • Detected restart. Removing temporary directory., xrefs: 00498013
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                                                                    • String ID: Detected restart. Removing temporary directory.
                                                                                    • API String ID: 1717587489-3199836293
                                                                                    • Opcode ID: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
                                                                                    • Instruction ID: bb05712aa7eb36d303e19ffab6eef2c78f2a463723ea7eca767f41585c441369
                                                                                    • Opcode Fuzzy Hash: 281135f9a0ad5b4e488772808dcd9eaa6bf3b34c39f962a9f46887a4a11e3304
                                                                                    • Instruction Fuzzy Hash: BDE0E532208A406DDA1177BABC1396B7F5CDB46768B22487FF50882552D92D481CC53D
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000001.00000002.3930535406.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000001.00000002.3930503542.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930600198.0000000000499000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930619129.000000000049A000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930642741.000000000049B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000001.00000002.3930664944.00000000004AB000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_1_2_400000_vwZcJ81cpN.jbxd
                                                                                    Similarity
                                                                                    • API ID: ErrorLastSleep
                                                                                    • String ID:
                                                                                    • API String ID: 1458359878-0
                                                                                    • Opcode ID: 1a9f46df8411143c40a07a37eb8806f02fdea1552ea3146ec5e635b784cd6770
                                                                                    • Instruction ID: f31041694d7e6b08a2ea33ec2b58b28b25921f40701f973673b956735a8b67d8
                                                                                    • Opcode Fuzzy Hash: 1a9f46df8411143c40a07a37eb8806f02fdea1552ea3146ec5e635b784cd6770
                                                                                    • Instruction Fuzzy Hash: 42F02B32705F58A78B21B56A889157FB2A8DB81366750012BFC0CD7313C878CC058BBC

                                                                                    Execution Graph

                                                                                    Execution Coverage:1%
                                                                                    Dynamic/Decrypted Code Coverage:65.7%
                                                                                    Signature Coverage:19.9%
                                                                                    Total number of Nodes:432
                                                                                    Total number of Limit Nodes:22
                                                                                    execution_graph 61080 4016c2 61081 40d82a RegOpenKeyExA 61080->61081 61082 9b5e59 61083 9b5e5f RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 61082->61083 61153 9b42c7 61083->61153 61085 9b5ec6 GetTickCount 61086 9b59f4 59 API calls 61085->61086 61087 9b5ee3 GetVersionExA 61086->61087 61088 9b5f24 _memset 61087->61088 61089 9c1fac _malloc 59 API calls 61088->61089 61090 9b5f31 61089->61090 61091 9c1fac _malloc 59 API calls 61090->61091 61092 9b5f41 61091->61092 61093 9c1fac _malloc 59 API calls 61092->61093 61094 9b5f4c 61093->61094 61095 9c1fac _malloc 59 API calls 61094->61095 61096 9b5f57 61095->61096 61097 9c1fac _malloc 59 API calls 61096->61097 61098 9b5f62 61097->61098 61099 9c1fac _malloc 59 API calls 61098->61099 61100 9b5f6d 61099->61100 61101 9c1fac _malloc 59 API calls 61100->61101 61102 9b5f78 61101->61102 61103 9c1fac _malloc 59 API calls 61102->61103 61104 9b5f84 6 API calls 61103->61104 61105 9b5fd1 _memset 61104->61105 61106 9b5fea RtlEnterCriticalSection RtlLeaveCriticalSection 61105->61106 61107 9c1fac _malloc 59 API calls 61106->61107 61108 9b6026 61107->61108 61109 9c1fac _malloc 59 API calls 61108->61109 61110 9b6034 61109->61110 61111 9c1fac _malloc 59 API calls 61110->61111 61112 9b603b 61111->61112 61113 9c1fac _malloc 59 API calls 61112->61113 61114 9b605c QueryPerformanceCounter Sleep 61113->61114 61115 9c1fac _malloc 59 API calls 61114->61115 61116 9b6082 61115->61116 61117 9c1fac _malloc 59 API calls 61116->61117 61140 9b6092 _memset 61117->61140 61118 9b6105 RtlEnterCriticalSection RtlLeaveCriticalSection 61118->61140 61119 9b60ff Sleep 61119->61118 61120 9b649a RtlLeaveCriticalSection 61121 9c133c 66 API calls 61120->61121 61121->61140 61122 9c133c 66 API calls 61122->61140 61123 9c1fac _malloc 59 API calls 61124 9b653b RtlEnterCriticalSection RtlLeaveCriticalSection 61123->61124 61124->61140 61125 9b67f2 RtlEnterCriticalSection RtlLeaveCriticalSection 61125->61140 61126 9b5c0c 59 API calls 61126->61140 61127 9c1418 _sprintf 84 API calls 61127->61140 61128 9b1ba7 RtlEnterCriticalSection RtlLeaveCriticalSection RtlEnterCriticalSection RtlLeaveCriticalSection 61128->61140 61129 9b6957 RtlEnterCriticalSection 61130 9b6984 RtlLeaveCriticalSection 61129->61130 61129->61140 61132 9b3c67 72 API calls 61130->61132 61131 9c1fac _malloc 59 API calls 61131->61140 61132->61140 61133 9b3d7e 64 API calls 61133->61140 61134 9b7336 89 API calls 61134->61140 61135 9b7fff 88 API calls 61135->61140 61136 9c1f74 _free 59 API calls 61136->61140 61137 9b73e5 71 API calls 61137->61140 61138 9c27b5 _Allocate 60 API calls 61138->61140 61139 9c1850 _swscanf 59 API calls 61139->61140 61140->61118 61140->61119 61140->61120 61140->61122 61140->61123 61140->61125 61140->61126 61140->61127 61140->61128 61140->61129 61140->61130 61140->61131 61140->61133 61140->61134 61140->61135 61140->61136 61140->61137 61140->61138 61140->61139 61141 9b33b2 86 API calls 61140->61141 61142 9b9721 73 API calls 61140->61142 61143 9b8733 6 API calls 61140->61143 61144 9b984b 60 API calls 61140->61144 61145 9c25e6 65 API calls _strtok 61140->61145 61146 9b5119 103 API calls 61140->61146 61147 9bc113 73 API calls 61140->61147 61148 9b9c0b 88 API calls 61140->61148 61149 9b676a shared_ptr 61140->61149 61150 9b676f Sleep 61140->61150 61141->61140 61142->61140 61143->61140 61144->61140 61145->61140 61146->61140 61147->61140 61148->61140 61149->61140 61149->61150 61152 9b4100 GetProcessHeap HeapFree 61149->61152 61151 9c08f0 GetProcessHeap HeapFree 61150->61151 61151->61149 61152->61149 61154 40d543 CreateDirectoryA 61155 40ddb4 61154->61155 61156 401848 61157 402073 lstrcmpiW 61156->61157 61158 402084 61157->61158 61159 9ec594 61160 9ec598 61159->61160 61163 9be8a2 CreateFileA 61160->61163 61164 9be99e 61163->61164 61165 9be8d3 61163->61165 61166 9be8eb DeviceIoControl 61165->61166 61167 9be994 CloseHandle 61165->61167 61168 9be960 GetLastError 61165->61168 61170 9c27b5 60 API calls 3 library calls 61165->61170 61166->61165 61167->61164 61168->61165 61168->61167 61170->61165 61171 4016ce 61172 4016f7 GetStartupInfoA 61171->61172 61174 4016ee 61171->61174 61173 4020db 61172->61173 61174->61173 61176 401301 FindResourceA 61174->61176 61177 401360 61176->61177 61178 401367 SizeofResource 61176->61178 61177->61173 61178->61177 61179 401386 LoadResource LockResource GlobalAlloc 61178->61179 61180 4013cc 61179->61180 61181 40141f GetTickCount 61180->61181 61183 40142a GlobalAlloc 61181->61183 61183->61177 61184 a0ffef 61185 a1cb0a DeleteFileA 61184->61185 61186 401ed1 CopyFileA 61187 401ed7 OpenSCManagerA 61186->61187 61189 4021f2 61187->61189 61190 40d212 RegCloseKey 61191 9b104d 61196 9c23a4 61191->61196 61202 9c22a8 61196->61202 61198 9b1057 61199 9b1aa9 InterlockedIncrement 61198->61199 61200 9b105c 61199->61200 61201 9b1ac5 WSAStartup InterlockedExchange 61199->61201 61201->61200 61203 9c22b4 __initptd 61202->61203 61210 9c7140 61203->61210 61209 9c22db __initptd 61209->61198 61227 9c749b 61210->61227 61212 9c22bd 61213 9c22ec RtlDecodePointer RtlDecodePointer 61212->61213 61214 9c2319 61213->61214 61215 9c22c9 61213->61215 61214->61215 61236 9c7d0d 60 API calls __cftoa_l 61214->61236 61224 9c22e6 61215->61224 61217 9c237c RtlEncodePointer RtlEncodePointer 61217->61215 61218 9c232b 61218->61217 61219 9c2350 61218->61219 61237 9c76a9 62 API calls 2 library calls 61218->61237 61219->61215 61222 9c236a RtlEncodePointer 61219->61222 61238 9c76a9 62 API calls 2 library calls 61219->61238 61222->61217 61223 9c2364 61223->61215 61223->61222 61239 9c7149 61224->61239 61228 9c74ac 61227->61228 61229 9c74bf RtlEnterCriticalSection 61227->61229 61234 9c7523 59 API calls 8 library calls 61228->61234 61229->61212 61231 9c74b2 61231->61229 61235 9c6fed 59 API calls 3 library calls 61231->61235 61234->61231 61236->61218 61237->61219 61238->61223 61242 9c7605 RtlLeaveCriticalSection 61239->61242 61241 9c22eb 61241->61209 61242->61241 61243 401859 lstrcmpiW 61244 4018b3 61243->61244 61244->61244 61245 40d31b RegQueryValueExA 61246 40dc9c 61247 40dd00 VirtualAlloc 61246->61247 61248 40dc9f 61246->61248 61248->61247 61249 401d9d RegCreateKeyExA 61250 401bdf 61251 401cf5 RegCloseKey 61250->61251 61252 40209c 61251->61252 61253 402a20 GetVersion 61277 403b64 HeapCreate 61253->61277 61255 402a7f 61256 402a84 61255->61256 61257 402a8c 61255->61257 61352 402b3b 8 API calls 61256->61352 61289 403844 61257->61289 61261 402a94 GetCommandLineA 61303 403712 61261->61303 61265 402aae 61335 40340c 61265->61335 61267 402ab3 61268 402ab8 GetStartupInfoA 61267->61268 61348 4033b4 61268->61348 61270 402aca GetModuleHandleA 61272 402aee 61270->61272 61353 40315b GetCurrentProcess TerminateProcess ExitProcess 61272->61353 61274 402af7 61354 403230 UnhandledExceptionFilter 61274->61354 61276 402b08 61278 403b84 61277->61278 61279 403bba 61277->61279 61355 403a1c 19 API calls 61278->61355 61279->61255 61281 403b89 61282 403ba0 61281->61282 61283 403b93 61281->61283 61284 403bbd 61282->61284 61357 40478c HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 61282->61357 61356 403f3b HeapAlloc 61283->61356 61284->61255 61287 403b9d 61287->61284 61288 403bae HeapDestroy 61287->61288 61288->61279 61358 402b5f 61289->61358 61292 403863 GetStartupInfoA 61295 4038af 61292->61295 61301 403974 61292->61301 61299 403920 61295->61299 61300 402b5f 12 API calls 61295->61300 61295->61301 61296 4039db SetHandleCount 61296->61261 61297 40399b GetStdHandle 61298 4039a9 GetFileType 61297->61298 61297->61301 61298->61301 61299->61301 61302 403942 GetFileType 61299->61302 61300->61295 61301->61296 61301->61297 61302->61299 61304 403760 61303->61304 61305 40372d GetEnvironmentStringsW 61303->61305 61307 403735 61304->61307 61308 403751 61304->61308 61306 403741 GetEnvironmentStrings 61305->61306 61305->61307 61306->61308 61311 402aa4 61306->61311 61309 403779 WideCharToMultiByte 61307->61309 61310 40376d GetEnvironmentStringsW 61307->61310 61308->61311 61312 4037f3 GetEnvironmentStrings 61308->61312 61316 4037ff 61308->61316 61314 4037ad 61309->61314 61315 4037df FreeEnvironmentStringsW 61309->61315 61310->61309 61310->61311 61326 4034c5 61311->61326 61312->61311 61312->61316 61318 402b5f 12 API calls 61314->61318 61315->61311 61317 402b5f 12 API calls 61316->61317 61324 40381a 61317->61324 61319 4037b3 61318->61319 61319->61315 61320 4037bc WideCharToMultiByte 61319->61320 61322 4037d6 61320->61322 61323 4037cd 61320->61323 61321 403830 FreeEnvironmentStringsA 61321->61311 61322->61315 61367 402c11 61323->61367 61324->61321 61327 4034d7 61326->61327 61328 4034dc GetModuleFileNameA 61326->61328 61380 405d24 19 API calls 61327->61380 61330 4034ff 61328->61330 61331 402b5f 12 API calls 61330->61331 61332 403520 61331->61332 61333 403530 61332->61333 61381 402b16 7 API calls 61332->61381 61333->61265 61336 403419 61335->61336 61338 40341e 61335->61338 61382 405d24 19 API calls 61336->61382 61339 402b5f 12 API calls 61338->61339 61340 40344b 61339->61340 61347 40345f 61340->61347 61383 402b16 7 API calls 61340->61383 61342 4034a2 61343 402c11 7 API calls 61342->61343 61344 4034ae 61343->61344 61344->61267 61345 402b5f 12 API calls 61345->61347 61347->61342 61347->61345 61384 402b16 7 API calls 61347->61384 61349 4033bd 61348->61349 61351 4033c2 61348->61351 61385 405d24 19 API calls 61349->61385 61351->61270 61353->61274 61354->61276 61355->61281 61356->61287 61357->61287 61362 402b71 61358->61362 61361 402b16 7 API calls 61361->61292 61363 402b6e 61362->61363 61365 402b78 61362->61365 61363->61292 61363->61361 61365->61363 61366 402b9d 12 API calls 61365->61366 61366->61365 61368 402c1d 61367->61368 61376 402c39 61367->61376 61369 402c27 61368->61369 61370 402c3d 61368->61370 61372 402c69 HeapFree 61369->61372 61373 402c33 61369->61373 61371 402c68 61370->61371 61375 402c57 61370->61375 61371->61372 61372->61376 61378 403fae VirtualFree VirtualFree HeapFree 61373->61378 61379 404a3f VirtualFree HeapFree VirtualFree 61375->61379 61376->61322 61378->61376 61379->61376 61380->61328 61381->61333 61382->61338 61383->61347 61384->61347 61385->61351 61386 4020a2 61387 4020b7 CopyFileA 61386->61387 61389 401d63 61393 9c2978 61389->61393 61391 40dd82 61394 9c2986 61393->61394 61395 9c2981 61393->61395 61399 9c299b 61394->61399 61407 9c917c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 61395->61407 61398 401d6c Sleep 61398->61391 61400 9c29a7 __initptd 61399->61400 61404 9c29f5 ___DllMainCRTStartup 61400->61404 61406 9c2a52 __initptd 61400->61406 61408 9c2806 61400->61408 61402 9c2a2f 61403 9c2806 __CRT_INIT@12 138 API calls 61402->61403 61402->61406 61403->61406 61404->61402 61405 9c2806 __CRT_INIT@12 138 API calls 61404->61405 61404->61406 61405->61402 61406->61398 61407->61394 61409 9c2812 __initptd 61408->61409 61410 9c281a 61409->61410 61411 9c2894 61409->61411 61456 9c6e46 GetProcessHeap 61410->61456 61413 9c28fd 61411->61413 61414 9c2898 61411->61414 61416 9c2960 61413->61416 61417 9c2902 61413->61417 61419 9c28b9 61414->61419 61449 9c2823 __initptd __CRT_INIT@12 61414->61449 61545 9c7009 59 API calls _doexit 61414->61545 61415 9c281f 61415->61449 61457 9c49f4 61415->61457 61416->61449 61560 9c4884 59 API calls 2 library calls 61416->61560 61550 9c7d7b TlsGetValue 61417->61550 61546 9c6ee0 61 API calls _free 61419->61546 61422 9c290d 61422->61449 61551 9c761a 61422->61551 61425 9c282f __RTC_Initialize 61433 9c283f GetCommandLineA 61425->61433 61425->61449 61426 9c28be 61428 9c28cf __CRT_INIT@12 61426->61428 61547 9c8e1a 60 API calls _free 61426->61547 61549 9c28e8 62 API calls __mtterm 61428->61549 61432 9c28ca 61548 9c4a6a 62 API calls 2 library calls 61432->61548 61478 9c9218 GetEnvironmentStringsW 61433->61478 61437 9c2936 61439 9c293c 61437->61439 61440 9c2954 61437->61440 61558 9c4941 59 API calls 3 library calls 61439->61558 61559 9c1f74 59 API calls 2 library calls 61440->61559 61444 9c2859 61446 9c285d 61444->61446 61510 9c8e6c 61444->61510 61445 9c2944 GetCurrentThreadId 61445->61449 61543 9c4a6a 62 API calls 2 library calls 61446->61543 61449->61404 61451 9c287d 61451->61449 61544 9c8e1a 60 API calls _free 61451->61544 61456->61415 61561 9c70b0 36 API calls 2 library calls 61457->61561 61459 9c49f9 61562 9c75cc InitializeCriticalSectionAndSpinCount __mtinitlocknum 61459->61562 61461 9c49fe 61462 9c4a02 61461->61462 61564 9c7d3e TlsAlloc 61461->61564 61563 9c4a6a 62 API calls 2 library calls 61462->61563 61465 9c4a07 61465->61425 61466 9c4a14 61466->61462 61467 9c4a1f 61466->61467 61468 9c761a __calloc_crt 59 API calls 61467->61468 61469 9c4a2c 61468->61469 61470 9c4a61 61469->61470 61565 9c7d9a TlsSetValue 61469->61565 61567 9c4a6a 62 API calls 2 library calls 61470->61567 61473 9c4a66 61473->61425 61474 9c4a40 61474->61470 61475 9c4a46 61474->61475 61566 9c4941 59 API calls 3 library calls 61475->61566 61477 9c4a4e GetCurrentThreadId 61477->61425 61479 9c922b WideCharToMultiByte 61478->61479 61480 9c284f 61478->61480 61482 9c925e 61479->61482 61483 9c9295 FreeEnvironmentStringsW 61479->61483 61491 9c8b66 61480->61491 61568 9c7662 59 API calls 2 library calls 61482->61568 61483->61480 61485 9c9264 61485->61483 61486 9c926b WideCharToMultiByte 61485->61486 61487 9c928a FreeEnvironmentStringsW 61486->61487 61488 9c9281 61486->61488 61487->61480 61569 9c1f74 59 API calls 2 library calls 61488->61569 61490 9c9287 61490->61487 61492 9c8b72 __initptd 61491->61492 61493 9c749b __lock 59 API calls 61492->61493 61494 9c8b79 61493->61494 61495 9c761a __calloc_crt 59 API calls 61494->61495 61496 9c8b8a 61495->61496 61497 9c8bf5 GetStartupInfoW 61496->61497 61498 9c8b95 __initptd @_EH4_CallFilterFunc@8 61496->61498 61504 9c8c0a 61497->61504 61507 9c8d39 61497->61507 61498->61444 61499 9c8e01 61572 9c8e11 RtlLeaveCriticalSection _doexit 61499->61572 61501 9c761a __calloc_crt 59 API calls 61501->61504 61502 9c8d86 GetStdHandle 61502->61507 61503 9c8d99 GetFileType 61503->61507 61504->61501 61506 9c8c58 61504->61506 61504->61507 61505 9c8c8c GetFileType 61505->61506 61506->61505 61506->61507 61570 9c7dbc InitializeCriticalSectionAndSpinCount 61506->61570 61507->61499 61507->61502 61507->61503 61571 9c7dbc InitializeCriticalSectionAndSpinCount 61507->61571 61511 9c8e7f GetModuleFileNameA 61510->61511 61512 9c8e7a 61510->61512 61513 9c8eac 61511->61513 61579 9c3eea 71 API calls __setmbcp 61512->61579 61573 9c8f1f 61513->61573 61516 9c2869 61516->61451 61521 9c909b 61516->61521 61519 9c8ee5 61519->61516 61520 9c8f1f _parse_cmdline 59 API calls 61519->61520 61520->61516 61522 9c90a4 61521->61522 61524 9c90a9 _strlen 61521->61524 61583 9c3eea 71 API calls __setmbcp 61522->61583 61525 9c761a __calloc_crt 59 API calls 61524->61525 61528 9c2872 61524->61528 61526 9c90df _strlen 61525->61526 61526->61528 61529 9c9131 61526->61529 61530 9c761a __calloc_crt 59 API calls 61526->61530 61531 9c9158 61526->61531 61534 9c916f 61526->61534 61584 9c591c 59 API calls __cftoa_l 61526->61584 61528->61451 61537 9c7018 61528->61537 61585 9c1f74 59 API calls 2 library calls 61529->61585 61530->61526 61586 9c1f74 59 API calls 2 library calls 61531->61586 61587 9c3b65 8 API calls 2 library calls 61534->61587 61536 9c917b 61538 9c7024 __IsNonwritableInCurrentImage 61537->61538 61588 9cab7f 61538->61588 61540 9c7042 __initterm_e 61541 9c23a4 __cinit 68 API calls 61540->61541 61542 9c7061 __cinit __IsNonwritableInCurrentImage 61540->61542 61541->61542 61542->61451 61543->61449 61544->61446 61545->61419 61546->61426 61547->61432 61548->61428 61549->61449 61550->61422 61554 9c7621 61551->61554 61553 9c291e 61553->61449 61557 9c7d9a TlsSetValue 61553->61557 61554->61553 61556 9c763f 61554->61556 61591 9ce9a8 61554->61591 61556->61553 61556->61554 61599 9c80b7 Sleep 61556->61599 61557->61437 61558->61445 61559->61449 61560->61449 61561->61459 61562->61461 61563->61465 61564->61466 61565->61474 61566->61477 61567->61473 61568->61485 61569->61490 61570->61506 61571->61507 61572->61498 61575 9c8f41 61573->61575 61578 9c8fa5 61575->61578 61581 9cef86 59 API calls x_ismbbtype_l 61575->61581 61576 9c8ec2 61576->61516 61580 9c7662 59 API calls 2 library calls 61576->61580 61578->61576 61582 9cef86 59 API calls x_ismbbtype_l 61578->61582 61579->61511 61580->61519 61581->61575 61582->61578 61583->61524 61584->61526 61585->61528 61586->61528 61587->61536 61589 9cab82 RtlEncodePointer 61588->61589 61589->61589 61590 9cab9c 61589->61590 61590->61540 61592 9ce9ce 61591->61592 61593 9ce9b3 61591->61593 61596 9ce9de RtlAllocateHeap 61592->61596 61597 9ce9c4 61592->61597 61601 9c6e63 RtlDecodePointer 61592->61601 61593->61592 61594 9ce9bf 61593->61594 61600 9c4abb 59 API calls __getptd_noexit 61594->61600 61596->61592 61596->61597 61597->61554 61599->61556 61600->61597 61601->61592 61602 9ecdbd 61603 9ecd4a 61602->61603 61607 9be9a6 LoadLibraryA 61603->61607 61604 a4f1f7 61606 9be9a6 64 API calls 61604->61606 61606->61604 61608 9bea89 61607->61608 61609 9be9cf GetProcAddress 61607->61609 61608->61604 61610 9bea82 FreeLibrary 61609->61610 61613 9be9e3 61609->61613 61610->61608 61611 9be9f5 GetAdaptersInfo 61611->61613 61612 9bea7d 61612->61610 61613->61611 61613->61612 61615 9c27b5 60 API calls 3 library calls 61613->61615 61615->61613 61616 a0f503 61617 a0fbf7 WriteFile 61616->61617 61619 401b65 Sleep 61620 40d953 61619->61620 61621 40d32d GetModuleHandleA 61622 40dd48 GetModuleFileNameA 61621->61622 61626 4016b9 61627 40d6e6 RegSetValueExA 61626->61627 61629 4017ba LoadLibraryExA 61630 4017d2 61629->61630 61631 4023fb 61632 40d38a 61631->61632 61633 40d38f ExitProcess 61632->61633 61634 a3ea5c 61635 a4caac InternetReadFile 61634->61635 61636 a4ea6c 61635->61636

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 215 9b5e59-9b60e7 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 9b42c7 GetTickCount call 9b59f4 GetVersionExA call 9c3750 call 9c1fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 9c3750 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 9c1fac * 4 QueryPerformanceCounter Sleep call 9c1fac * 2 call 9c3750 * 2 261 9b60eb-9b60ed 215->261 262 9b60ef-9b60f4 261->262 263 9b60f6-9b60f8 261->263 266 9b60ff Sleep 262->266 264 9b60fa 263->264 265 9b6105-9b6422 RtlEnterCriticalSection RtlLeaveCriticalSection 263->265 264->266 268 9b649a-9b64c4 RtlLeaveCriticalSection call 9c133c 265->268 269 9b6424-9b6427 265->269 266->265 272 9b650e-9b6526 call 9c133c 268->272 273 9b64c6-9b64d5 call 9c133c 268->273 269->268 279 9b67cd-9b67dc call 9c133c 272->279 280 9b652c-9b652e 272->280 273->272 278 9b64d7-9b64e6 call 9c133c 273->278 278->272 288 9b64e8-9b64f7 call 9c133c 278->288 289 9b67de-9b67e0 279->289 290 9b6821-9b6830 call 9c133c 279->290 280->279 283 9b6534-9b65df call 9c1fac RtlEnterCriticalSection RtlLeaveCriticalSection call 9c3750 * 5 call 9b439c * 2 280->283 334 9b661c 283->334 335 9b65e1-9b65e3 283->335 288->272 303 9b64f9-9b6508 call 9c133c 288->303 289->290 291 9b67e2-9b681c call 9c3750 RtlEnterCriticalSection RtlLeaveCriticalSection 289->291 301 9b6832 call 9b5c0c 290->301 302 9b6845-9b6854 call 9c133c 290->302 291->261 309 9b6837-9b6840 call 9b5d1a 301->309 302->261 314 9b685a-9b685c 302->314 303->261 303->272 309->261 314->261 317 9b6862-9b687b call 9b439c 314->317 317->261 322 9b6881-9b6950 call 9c1418 call 9b1ba7 317->322 332 9b6952 call 9b143f 322->332 333 9b6957-9b6978 RtlEnterCriticalSection 322->333 332->333 339 9b697a-9b6981 333->339 340 9b6984-9b69eb RtlLeaveCriticalSection call 9b3c67 call 9b3d7e call 9b7336 333->340 337 9b6620-9b664e call 9c1fac call 9c3750 call 9b439c 334->337 335->334 336 9b65e5-9b65f7 call 9c133c 335->336 336->334 347 9b65f9-9b661a call 9b439c 336->347 360 9b668f-9b6698 call 9c1f74 337->360 361 9b6650-9b665f call 9c25e6 337->361 339->340 358 9b6b53-9b6b67 call 9b7fff 340->358 359 9b69f1-9b6a33 call 9b9721 340->359 347->337 358->261 371 9b6a39-9b6a40 359->371 372 9b6b1d-9b6b4e call 9b73e5 call 9b33b2 359->372 373 9b67bb-9b67c8 360->373 374 9b669e-9b66b6 call 9c27b5 360->374 361->360 370 9b6661 361->370 375 9b6666-9b6678 call 9c1850 370->375 377 9b6a43-9b6a48 371->377 372->358 373->261 386 9b66b8-9b66c0 call 9b8733 374->386 387 9b66c2 374->387 390 9b667a 375->390 391 9b667d-9b668d call 9c25e6 375->391 377->377 381 9b6a4a-9b6a8f call 9b9721 377->381 381->372 396 9b6a95-9b6a9b 381->396 389 9b66c4-9b6768 call 9b984b call 9b3863 call 9b5119 call 9b3863 call 9b9af1 call 9b9c0b 386->389 387->389 416 9b676a call 9b380b 389->416 417 9b676f-9b679a Sleep call 9c08f0 389->417 390->391 391->360 391->375 399 9b6a9e-9b6aa3 396->399 399->399 401 9b6aa5-9b6ae0 call 9b9721 399->401 401->372 407 9b6ae2-9b6b1c call 9bc113 401->407 407->372 416->417 421 9b679c-9b67a5 call 9b4100 417->421 422 9b67a6-9b67b4 417->422 421->422 422->373 424 9b67b6 call 9b380b 422->424 424->373
                                                                                    APIs
                                                                                    • RtlInitializeCriticalSection.NTDLL(009E4FD0), ref: 009B5E8D
                                                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 009B5EA4
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 009B5EAD
                                                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 009B5EBC
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 009B5EBF
                                                                                    • GetTickCount.KERNEL32 ref: 009B5ED3
                                                                                      • Part of subcall function 009B59F4: _malloc.LIBCMT ref: 009B5A02
                                                                                    • GetVersionExA.KERNEL32(009E4E20), ref: 009B5F00
                                                                                    • _memset.LIBCMT ref: 009B5F1F
                                                                                    • _malloc.LIBCMT ref: 009B5F2C
                                                                                      • Part of subcall function 009C1FAC: __FF_MSGBANNER.LIBCMT ref: 009C1FC3
                                                                                      • Part of subcall function 009C1FAC: __NMSG_WRITE.LIBCMT ref: 009C1FCA
                                                                                      • Part of subcall function 009C1FAC: RtlAllocateHeap.NTDLL(008B0000,00000000,00000001), ref: 009C1FEF
                                                                                    • _malloc.LIBCMT ref: 009B5F3C
                                                                                    • _malloc.LIBCMT ref: 009B5F47
                                                                                    • _malloc.LIBCMT ref: 009B5F52
                                                                                    • _malloc.LIBCMT ref: 009B5F5D
                                                                                    • _malloc.LIBCMT ref: 009B5F68
                                                                                    • _malloc.LIBCMT ref: 009B5F73
                                                                                    • _malloc.LIBCMT ref: 009B5F7F
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000004), ref: 009B5F96
                                                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 009B5F9F
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 009B5FAB
                                                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 009B5FAE
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 009B5FB9
                                                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 009B5FBC
                                                                                    • _memset.LIBCMT ref: 009B5FCC
                                                                                    • _memset.LIBCMT ref: 009B5FD8
                                                                                    • _memset.LIBCMT ref: 009B5FE5
                                                                                    • RtlEnterCriticalSection.NTDLL(009E4FD0), ref: 009B5FF3
                                                                                    • RtlLeaveCriticalSection.NTDLL(009E4FD0), ref: 009B6000
                                                                                    • _malloc.LIBCMT ref: 009B6021
                                                                                    • _malloc.LIBCMT ref: 009B602F
                                                                                    • _malloc.LIBCMT ref: 009B6036
                                                                                    • _malloc.LIBCMT ref: 009B6057
                                                                                    • QueryPerformanceCounter.KERNEL32(00000200), ref: 009B6063
                                                                                    • Sleep.KERNEL32(00000000), ref: 009B6071
                                                                                    • _malloc.LIBCMT ref: 009B607D
                                                                                    • _malloc.LIBCMT ref: 009B608D
                                                                                    • _memset.LIBCMT ref: 009B60A2
                                                                                    • _memset.LIBCMT ref: 009B60B2
                                                                                    • Sleep.KERNEL32(0000EA60), ref: 009B60FF
                                                                                    • RtlEnterCriticalSection.NTDLL(009E4FD0), ref: 009B610A
                                                                                    • RtlLeaveCriticalSection.NTDLL(009E4FD0), ref: 009B611B
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B1000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9b1000_megasoftdivxconverter.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _malloc$Heap$_memset$CriticalSection$Allocate$Process$AddressEnterHandleLeaveModuleProcSleep$CountCounterInitializePerformanceQueryTickVersion
                                                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$gpt=%.8x&advizor=%d&box=%d&hp=%x&lp=%x&line=%d&os=%d.%d.%04d&flag=%d&itd=%d$ntdll.dll$sprintf$strcat
                                                                                    • API String ID: 1856495841-1038016512
                                                                                    • Opcode ID: 38ebb263c2ea9517e9db97ea7ffb76c5adbb6ba6d7c05460506dde2913d72688
                                                                                    • Instruction ID: c5e280823c41f0f84a9edcd48eb376912a4ef7e0236fa6122650b89b373f26b4
                                                                                    • Opcode Fuzzy Hash: 38ebb263c2ea9517e9db97ea7ffb76c5adbb6ba6d7c05460506dde2913d72688
                                                                                    • Instruction Fuzzy Hash: 2D71F4B1C593809FD310AF34AC59B5B7BE4EFCA714F05481EF18897292DBB849009B96

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 805 9be9a6-9be9c9 LoadLibraryA 806 9bea89-9bea90 805->806 807 9be9cf-9be9dd GetProcAddress 805->807 808 9be9e3-9be9f3 807->808 809 9bea82-9bea83 FreeLibrary 807->809 810 9be9f5-9bea01 GetAdaptersInfo 808->810 809->806 811 9bea39-9bea41 810->811 812 9bea03 810->812 814 9bea4a-9bea4f 811->814 815 9bea43-9bea49 call 9c26cf 811->815 813 9bea05-9bea0c 812->813 816 9bea0e-9bea12 813->816 817 9bea16-9bea1e 813->817 819 9bea7d-9bea81 814->819 820 9bea51-9bea54 814->820 815->814 816->813 822 9bea14 816->822 823 9bea21-9bea26 817->823 819->809 820->819 821 9bea56-9bea5b 820->821 825 9bea68-9bea73 call 9c27b5 821->825 826 9bea5d-9bea65 821->826 822->811 823->823 827 9bea28-9bea35 call 9be6f5 823->827 825->819 832 9bea75-9bea78 825->832 826->825 827->811 832->810
                                                                                    APIs
                                                                                    • LoadLibraryA.KERNEL32(iphlpapi.dll), ref: 009BE9BC
                                                                                    • GetProcAddress.KERNEL32(00000000,GetAdaptersInfo), ref: 009BE9D5
                                                                                    • GetAdaptersInfo.IPHLPAPI(?,?), ref: 009BE9FA
                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 009BEA83
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B1000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9b1000_megasoftdivxconverter.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Library$AdaptersAddressFreeInfoLoadProc
                                                                                    • String ID: GetAdaptersInfo$iphlpapi.dll
                                                                                    • API String ID: 514930453-3114217049
                                                                                    • Opcode ID: cb4e772866b857332ee7ecf3b50400d93530f2a0ee2e8a2cb705a1f8e75c1442
                                                                                    • Instruction ID: 9f3c29ee17bf16ab099c427cad15e210a56b66108e2dc0db20a16caf26577831
                                                                                    • Opcode Fuzzy Hash: cb4e772866b857332ee7ecf3b50400d93530f2a0ee2e8a2cb705a1f8e75c1442
                                                                                    • Instruction Fuzzy Hash: F821B575A042099FDB10DFA8D984AEEBBFCFF45320F5441AAE508E7241DB309D45CBA4

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 833 9be8a2-9be8cd CreateFileA 834 9be99e-9be9a5 833->834 835 9be8d3-9be8e8 833->835 836 9be8eb-9be90d DeviceIoControl 835->836 837 9be90f-9be917 836->837 838 9be946-9be94e 836->838 841 9be919-9be91e 837->841 842 9be920-9be925 837->842 839 9be950-9be956 call 9c26cf 838->839 840 9be957-9be959 838->840 839->840 844 9be95b-9be95e 840->844 845 9be994-9be99d CloseHandle 840->845 841->838 842->838 846 9be927-9be92f 842->846 848 9be97a-9be987 call 9c27b5 844->848 849 9be960-9be969 GetLastError 844->849 845->834 850 9be932-9be937 846->850 848->845 858 9be989-9be98f 848->858 849->845 852 9be96b-9be96e 849->852 850->850 851 9be939-9be945 call 9be6f5 850->851 851->838 852->848 855 9be970-9be977 852->855 855->848 858->836
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(\\.\PhysicalDrive0,00000000,00000007,00000000,00000003,00000000,00000000), ref: 009BE8C1
                                                                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000400,?,00000000), ref: 009BE8FF
                                                                                    • GetLastError.KERNEL32 ref: 009BE960
                                                                                    • CloseHandle.KERNEL32(?), ref: 009BE997
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B1000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9b1000_megasoftdivxconverter.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CloseControlCreateDeviceErrorFileHandleLast
                                                                                    • String ID: \\.\PhysicalDrive0
                                                                                    • API String ID: 4026078076-1180397377
                                                                                    • Opcode ID: 3c1cdc23109ceb9a53bcd3c583e2cf43c79eaaac6accc240c471ce9b3cc6ec6b
                                                                                    • Instruction ID: 416ffd60e823975d4d28f34311447dc38ec454bc7f8917d64f5fecbc91c3cff3
                                                                                    • Opcode Fuzzy Hash: 3c1cdc23109ceb9a53bcd3c583e2cf43c79eaaac6accc240c471ce9b3cc6ec6b
                                                                                    • Instruction Fuzzy Hash: BD318E75E00219EBDB24DF94D984AFEBBBCEF45720F24416EE509A7280D7705E48DBA0
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009E8000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E8000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9e8000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileInternetRead
                                                                                    • String ID:
                                                                                    • API String ID: 778332206-0
                                                                                    • Opcode ID: aae0e172e8e89bc4836143cb59fee11c0e74c4e60fa7bf31863d4a7f3e8c6a28
                                                                                    • Instruction ID: 78fef606628c9f74ced6b0ad6b3576bba58e6bb6ed067498cbd14ac61ca4b3da
                                                                                    • Opcode Fuzzy Hash: aae0e172e8e89bc4836143cb59fee11c0e74c4e60fa7bf31863d4a7f3e8c6a28
                                                                                    • Instruction Fuzzy Hash: 92E0D8B681D528EFD3013E08DC403BCB3F4AB56791F160939D7C693200E632480057D7

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 9b5dfe-9b5e15 1 9b5e5f-9b60e7 RtlInitializeCriticalSection GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress call 9b42c7 GetTickCount call 9b59f4 GetVersionExA call 9c3750 call 9c1fac * 8 GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap GetProcessHeap RtlAllocateHeap call 9c3750 * 3 RtlEnterCriticalSection RtlLeaveCriticalSection call 9c1fac * 4 QueryPerformanceCounter Sleep call 9c1fac * 2 call 9c3750 * 2 0->1 2 9b5e17-9b5e1a 0->2 49 9b60eb-9b60ed 1->49 3 9b5e1c-9b5e2d 2->3 4 9b5dc2-9b5dd2 2->4 3->1 4->0 50 9b60ef-9b60f4 49->50 51 9b60f6-9b60f8 49->51 54 9b60ff Sleep 50->54 52 9b60fa 51->52 53 9b6105-9b6422 RtlEnterCriticalSection RtlLeaveCriticalSection 51->53 52->54 56 9b649a-9b64c4 RtlLeaveCriticalSection call 9c133c 53->56 57 9b6424-9b6427 53->57 54->53 60 9b650e-9b6526 call 9c133c 56->60 61 9b64c6-9b64d5 call 9c133c 56->61 57->56 67 9b67cd-9b67dc call 9c133c 60->67 68 9b652c-9b652e 60->68 61->60 66 9b64d7-9b64e6 call 9c133c 61->66 66->60 76 9b64e8-9b64f7 call 9c133c 66->76 77 9b67de-9b67e0 67->77 78 9b6821-9b6830 call 9c133c 67->78 68->67 71 9b6534-9b65df call 9c1fac RtlEnterCriticalSection RtlLeaveCriticalSection call 9c3750 * 5 call 9b439c * 2 68->71 122 9b661c 71->122 123 9b65e1-9b65e3 71->123 76->60 91 9b64f9-9b6508 call 9c133c 76->91 77->78 79 9b67e2-9b681c call 9c3750 RtlEnterCriticalSection RtlLeaveCriticalSection 77->79 89 9b6832-9b6840 call 9b5c0c call 9b5d1a 78->89 90 9b6845-9b6854 call 9c133c 78->90 79->49 89->49 90->49 102 9b685a-9b685c 90->102 91->49 91->60 102->49 105 9b6862-9b687b call 9b439c 102->105 105->49 110 9b6881-9b6950 call 9c1418 call 9b1ba7 105->110 120 9b6952 call 9b143f 110->120 121 9b6957-9b6978 RtlEnterCriticalSection 110->121 120->121 127 9b697a-9b6981 121->127 128 9b6984-9b69eb RtlLeaveCriticalSection call 9b3c67 call 9b3d7e call 9b7336 121->128 125 9b6620-9b664e call 9c1fac call 9c3750 call 9b439c 122->125 123->122 124 9b65e5-9b65f7 call 9c133c 123->124 124->122 135 9b65f9-9b661a call 9b439c 124->135 148 9b668f-9b6698 call 9c1f74 125->148 149 9b6650-9b665f call 9c25e6 125->149 127->128 146 9b6b53-9b6b67 call 9b7fff 128->146 147 9b69f1-9b6a33 call 9b9721 128->147 135->125 146->49 159 9b6a39-9b6a40 147->159 160 9b6b1d-9b6b4e call 9b73e5 call 9b33b2 147->160 161 9b67bb-9b67c8 148->161 162 9b669e-9b66b6 call 9c27b5 148->162 149->148 158 9b6661 149->158 163 9b6666-9b6678 call 9c1850 158->163 165 9b6a43-9b6a48 159->165 160->146 161->49 174 9b66b8-9b66c0 call 9b8733 162->174 175 9b66c2 162->175 178 9b667a 163->178 179 9b667d-9b668d call 9c25e6 163->179 165->165 169 9b6a4a-9b6a8f call 9b9721 165->169 169->160 184 9b6a95-9b6a9b 169->184 177 9b66c4-9b6768 call 9b984b call 9b3863 call 9b5119 call 9b3863 call 9b9af1 call 9b9c0b 174->177 175->177 204 9b676a call 9b380b 177->204 205 9b676f-9b679a Sleep call 9c08f0 177->205 178->179 179->148 179->163 187 9b6a9e-9b6aa3 184->187 187->187 189 9b6aa5-9b6ae0 call 9b9721 187->189 189->160 195 9b6ae2-9b6b1c call 9bc113 189->195 195->160 204->205 209 9b679c-9b67a5 call 9b4100 205->209 210 9b67a6-9b67b4 205->210 209->210 210->161 212 9b67b6 call 9b380b 210->212 212->161
                                                                                    APIs
                                                                                    • RtlInitializeCriticalSection.NTDLL(009E4FD0), ref: 009B5E8D
                                                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,sprintf), ref: 009B5EA4
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 009B5EAD
                                                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,strcat), ref: 009B5EBC
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 009B5EBF
                                                                                    • GetTickCount.KERNEL32 ref: 009B5ED3
                                                                                    • GetVersionExA.KERNEL32(009E4E20), ref: 009B5F00
                                                                                    • _memset.LIBCMT ref: 009B5F1F
                                                                                    • _malloc.LIBCMT ref: 009B5F2C
                                                                                    • _malloc.LIBCMT ref: 009B5F3C
                                                                                    • _malloc.LIBCMT ref: 009B5F47
                                                                                    • _malloc.LIBCMT ref: 009B5F52
                                                                                    • _malloc.LIBCMT ref: 009B5F5D
                                                                                    • _malloc.LIBCMT ref: 009B5F68
                                                                                    • _malloc.LIBCMT ref: 009B5F73
                                                                                    • _malloc.LIBCMT ref: 009B5F7F
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000004), ref: 009B5F96
                                                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 009B5F9F
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 009B5FAB
                                                                                    • RtlAllocateHeap.NTDLL(00000000), ref: 009B5FAE
                                                                                    • GetProcessHeap.KERNEL32(00000000,00000400), ref: 009B5FB9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B1000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9b1000_megasoftdivxconverter.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _malloc$Heap$Process$AddressAllocateHandleModuleProc$CountCriticalInitializeSectionTickVersion_memset
                                                                                    • String ID: Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$gpt=%.8x&advizor=%d&box=%d&hp=%x&lp=%x&line=%d&os=%d.%d.%04d&flag=%d&itd=%d$ntdll.dll$sprintf$strcat
                                                                                    • API String ID: 3475606656-1038016512
                                                                                    • Opcode ID: cdecc2d6d8c3b739b39042704072a9ebe0c93134baf13b72f1a6dac26ded88c8
                                                                                    • Instruction ID: c3eaeffee6473de2bac7f6fb933cb34a1ba9389b988b2676d97232e70e1ea33a
                                                                                    • Opcode Fuzzy Hash: cdecc2d6d8c3b739b39042704072a9ebe0c93134baf13b72f1a6dac26ded88c8
                                                                                    • Instruction Fuzzy Hash: 0E7104B1D593809FD310AF34EC59B5B7BE4EFCA704F05482EF1889B252DBB849448B96

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 427 9b641c-9b6422 428 9b649a-9b64c4 RtlLeaveCriticalSection call 9c133c 427->428 429 9b6424-9b6427 427->429 432 9b650e-9b6526 call 9c133c 428->432 433 9b64c6-9b64d5 call 9c133c 428->433 429->428 439 9b67cd-9b67dc call 9c133c 432->439 440 9b652c-9b652e 432->440 433->432 438 9b64d7-9b64e6 call 9c133c 433->438 438->432 448 9b64e8-9b64f7 call 9c133c 438->448 449 9b67de-9b67e0 439->449 450 9b6821-9b6830 call 9c133c 439->450 440->439 443 9b6534-9b65df call 9c1fac RtlEnterCriticalSection RtlLeaveCriticalSection call 9c3750 * 5 call 9b439c * 2 440->443 500 9b661c 443->500 501 9b65e1-9b65e3 443->501 448->432 463 9b64f9-9b6508 call 9c133c 448->463 449->450 451 9b67e2-9b681c call 9c3750 RtlEnterCriticalSection RtlLeaveCriticalSection 449->451 461 9b6832-9b6840 call 9b5c0c call 9b5d1a 450->461 462 9b6845-9b6854 call 9c133c 450->462 464 9b60eb-9b60ed 451->464 461->464 462->464 480 9b685a-9b685c 462->480 463->432 463->464 470 9b60ef-9b60f4 464->470 471 9b60f6-9b60f8 464->471 478 9b60ff Sleep 470->478 475 9b60fa 471->475 476 9b6105-9b6134 RtlEnterCriticalSection RtlLeaveCriticalSection 471->476 475->478 476->427 478->476 480->464 483 9b6862-9b687b call 9b439c 480->483 483->464 488 9b6881-9b6950 call 9c1418 call 9b1ba7 483->488 498 9b6952 call 9b143f 488->498 499 9b6957-9b6978 RtlEnterCriticalSection 488->499 498->499 505 9b697a-9b6981 499->505 506 9b6984-9b69eb RtlLeaveCriticalSection call 9b3c67 call 9b3d7e call 9b7336 499->506 503 9b6620-9b664e call 9c1fac call 9c3750 call 9b439c 500->503 501->500 502 9b65e5-9b65f7 call 9c133c 501->502 502->500 513 9b65f9-9b661a call 9b439c 502->513 526 9b668f-9b6698 call 9c1f74 503->526 527 9b6650-9b665f call 9c25e6 503->527 505->506 524 9b6b53-9b6b67 call 9b7fff 506->524 525 9b69f1-9b6a33 call 9b9721 506->525 513->503 524->464 537 9b6a39-9b6a40 525->537 538 9b6b1d-9b6b4e call 9b73e5 call 9b33b2 525->538 539 9b67bb-9b67c8 526->539 540 9b669e-9b66b6 call 9c27b5 526->540 527->526 536 9b6661 527->536 541 9b6666-9b6678 call 9c1850 536->541 543 9b6a43-9b6a48 537->543 538->524 539->464 552 9b66b8-9b66c0 call 9b8733 540->552 553 9b66c2 540->553 556 9b667a 541->556 557 9b667d-9b668d call 9c25e6 541->557 543->543 547 9b6a4a-9b6a8f call 9b9721 543->547 547->538 562 9b6a95-9b6a9b 547->562 555 9b66c4-9b6768 call 9b984b call 9b3863 call 9b5119 call 9b3863 call 9b9af1 call 9b9c0b 552->555 553->555 582 9b676a call 9b380b 555->582 583 9b676f-9b679a Sleep call 9c08f0 555->583 556->557 557->526 557->541 565 9b6a9e-9b6aa3 562->565 565->565 567 9b6aa5-9b6ae0 call 9b9721 565->567 567->538 573 9b6ae2-9b6b1c call 9bc113 567->573 573->538 582->583 587 9b679c-9b67a5 call 9b4100 583->587 588 9b67a6-9b67b4 583->588 587->588 588->539 590 9b67b6 call 9b380b 588->590 590->539
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B1000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9b1000_megasoftdivxconverter.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _memset$CriticalSection$Leave$Enter_malloc
                                                                                    • String ID: $%d;$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls
                                                                                    • API String ID: 2008792657-3804430022
                                                                                    • Opcode ID: d04079e1d20a8850aa2e2e22b63f99b76d5d1537f202d13f9950f1388fe23a56
                                                                                    • Instruction ID: 58bf85753613ef52dffc510a9810cc9f75cf7f389c5d5e8f9c82b19dd236705b
                                                                                    • Opcode Fuzzy Hash: d04079e1d20a8850aa2e2e22b63f99b76d5d1537f202d13f9950f1388fe23a56
                                                                                    • Instruction Fuzzy Hash: B902F0715483819BD334AB20D952BEF7BE8AFC6724F14881EF18987292DB74A804CB53

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 593 9b642e-9b6443 594 9b645f-9b6469 593->594 595 9b6445-9b644b 593->595 598 9b60eb-9b60ed 594->598 599 9b646f-9b6493 call 9c3750 call 9b439c 594->599 596 9b644d-9b644f 595->596 597 9b6451-9b645e call 9b534d 595->597 596->594 597->594 601 9b60ef-9b60f4 598->601 602 9b60f6-9b60f8 598->602 599->598 615 9b6499-9b64ba RtlEnterCriticalSection RtlLeaveCriticalSection 599->615 607 9b60ff Sleep 601->607 604 9b60fa 602->604 605 9b6105-9b6422 RtlEnterCriticalSection RtlLeaveCriticalSection 602->605 604->607 611 9b649a-9b64bb RtlLeaveCriticalSection call 9c133c 605->611 612 9b6424-9b6427 605->612 607->605 616 9b64c0-9b64c4 611->616 612->611 615->616 617 9b64bb call 9c133c 615->617 618 9b650e-9b6526 call 9c133c 616->618 619 9b64c6-9b64d5 call 9c133c 616->619 617->616 625 9b67cd-9b67dc call 9c133c 618->625 626 9b652c-9b652e 618->626 619->618 624 9b64d7-9b64e6 call 9c133c 619->624 624->618 634 9b64e8-9b64f7 call 9c133c 624->634 635 9b67de-9b67e0 625->635 636 9b6821-9b6830 call 9c133c 625->636 626->625 629 9b6534-9b65df call 9c1fac RtlEnterCriticalSection RtlLeaveCriticalSection call 9c3750 * 5 call 9b439c * 2 626->629 680 9b661c 629->680 681 9b65e1-9b65e3 629->681 634->618 649 9b64f9-9b6508 call 9c133c 634->649 635->636 637 9b67e2-9b681c call 9c3750 RtlEnterCriticalSection RtlLeaveCriticalSection 635->637 647 9b6832-9b6840 call 9b5c0c call 9b5d1a 636->647 648 9b6845-9b6854 call 9c133c 636->648 637->598 647->598 648->598 660 9b685a-9b685c 648->660 649->598 649->618 660->598 663 9b6862-9b687b call 9b439c 660->663 663->598 668 9b6881-9b6950 call 9c1418 call 9b1ba7 663->668 678 9b6952 call 9b143f 668->678 679 9b6957-9b6978 RtlEnterCriticalSection 668->679 678->679 685 9b697a-9b6981 679->685 686 9b6984-9b69eb RtlLeaveCriticalSection call 9b3c67 call 9b3d7e call 9b7336 679->686 683 9b6620-9b664e call 9c1fac call 9c3750 call 9b439c 680->683 681->680 682 9b65e5-9b65f7 call 9c133c 681->682 682->680 693 9b65f9-9b661a call 9b439c 682->693 706 9b668f-9b6698 call 9c1f74 683->706 707 9b6650-9b665f call 9c25e6 683->707 685->686 704 9b6b53-9b6b67 call 9b7fff 686->704 705 9b69f1-9b6a33 call 9b9721 686->705 693->683 704->598 717 9b6a39-9b6a40 705->717 718 9b6b1d-9b6b4e call 9b73e5 call 9b33b2 705->718 719 9b67bb-9b67c8 706->719 720 9b669e-9b66b6 call 9c27b5 706->720 707->706 716 9b6661 707->716 721 9b6666-9b6678 call 9c1850 716->721 723 9b6a43-9b6a48 717->723 718->704 719->598 732 9b66b8-9b66c0 call 9b8733 720->732 733 9b66c2 720->733 736 9b667a 721->736 737 9b667d-9b668d call 9c25e6 721->737 723->723 727 9b6a4a-9b6a8f call 9b9721 723->727 727->718 742 9b6a95-9b6a9b 727->742 735 9b66c4-9b6768 call 9b984b call 9b3863 call 9b5119 call 9b3863 call 9b9af1 call 9b9c0b 732->735 733->735 762 9b676a call 9b380b 735->762 763 9b676f-9b679a Sleep call 9c08f0 735->763 736->737 737->706 737->721 745 9b6a9e-9b6aa3 742->745 745->745 747 9b6aa5-9b6ae0 call 9b9721 745->747 747->718 753 9b6ae2-9b6b1c call 9bc113 747->753 753->718 762->763 767 9b679c-9b67a5 call 9b4100 763->767 768 9b67a6-9b67b4 763->768 767->768 768->719 770 9b67b6 call 9b380b 768->770 770->719
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B1000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9b1000_megasoftdivxconverter.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _memset$CriticalSection$EnterLeave_malloc_strtok$_free_swscanf
                                                                                    • String ID: <htm$Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)$auth_ip$auth_swith$block$connect$disconnect$idle$updips$updurls
                                                                                    • API String ID: 3441009308-1437582238
                                                                                    • Opcode ID: 797af944af07a82885cffb3d36f7a1383a78422eab5e66aee23ab6aca5308215
                                                                                    • Instruction ID: a1ee010ad89344513dae17730967c28bdc3d09f5eee6532e0b88d53dad280a6b
                                                                                    • Opcode Fuzzy Hash: 797af944af07a82885cffb3d36f7a1383a78422eab5e66aee23ab6aca5308215
                                                                                    • Instruction Fuzzy Hash: 0EA166316883419BD720AB249D56FAF7BE99FC6B24F14482EF489973D2DB64E800C747

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 773 401301-40135e FindResourceA 774 401360-401362 773->774 775 401367-40137d SizeofResource 773->775 776 401538-40153c 774->776 777 401386-4013fe LoadResource LockResource GlobalAlloc call 402490 * 2 775->777 778 40137f-401381 775->778 783 401407-40140b 777->783 778->776 784 40140d-40141d 783->784 785 40141f-401428 GetTickCount 783->785 784->783 787 401491-401499 785->787 788 40142a-40142e 785->788 789 4014a2-4014a8 787->789 790 401430-401438 788->790 791 40148f 788->791 792 4014f0-401525 GlobalAlloc call 401000 789->792 793 4014aa-4014e8 789->793 794 401441-401447 790->794 791->792 801 40152a-401535 792->801 795 4014ea 793->795 796 4014ee 793->796 798 401449-401485 794->798 799 40148d 794->799 795->796 796->789 802 401487 798->802 803 40148b 798->803 799->788 801->776 802->803 803->794
                                                                                    APIs
                                                                                    • FindResourceA.KERNEL32(?,0000000A), ref: 00401351
                                                                                    • SizeofResource.KERNEL32(00000000), ref: 00401370
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Resource$FindSizeof
                                                                                    • String ID:
                                                                                    • API String ID: 3019604839-3916222277
                                                                                    • Opcode ID: d05602b0e20a881077e161112d5bd34232c8f71c7560e683aad862cf59917e15
                                                                                    • Instruction ID: 779852d327d389dbbb2f1b261a2bb7141e3a4eae573781fe7d13a424a4f3f89b
                                                                                    • Opcode Fuzzy Hash: d05602b0e20a881077e161112d5bd34232c8f71c7560e683aad862cf59917e15
                                                                                    • Instruction Fuzzy Hash: F1811075D04258DFDF01CFE8D985AEEBBB0BF09305F1400AAE581B7262C3385A84DB69

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetVersion.KERNEL32 ref: 00402A46
                                                                                      • Part of subcall function 00403B64: HeapCreate.KERNEL32(00000000,00001000,00000000,00402A7F,00000000), ref: 00403B75
                                                                                      • Part of subcall function 00403B64: HeapDestroy.KERNEL32 ref: 00403BB4
                                                                                    • GetCommandLineA.KERNEL32 ref: 00402A94
                                                                                    • GetStartupInfoA.KERNEL32(?), ref: 00402ABF
                                                                                    • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00402AE2
                                                                                      • Part of subcall function 00402B3B: ExitProcess.KERNEL32 ref: 00402B58
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$CommandCreateDestroyExitHandleInfoLineModuleProcessStartupVersion
                                                                                    • String ID:
                                                                                    • API String ID: 2057626494-0
                                                                                    • Opcode ID: 81c04d43b3f46c58329c6832fe0805ef85b64df99fa32ea28edf2ad19d5a1781
                                                                                    • Instruction ID: 5f87248e4510ca7a7a053da507506fe2897125482441b09741c869e2758f94b2
                                                                                    • Opcode Fuzzy Hash: 81c04d43b3f46c58329c6832fe0805ef85b64df99fa32ea28edf2ad19d5a1781
                                                                                    • Instruction Fuzzy Hash: BA214CB19006159ADB04AFA6DE49A6E7FA8EB04715F10413FF905BB2D1DB384900CA6C

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 887 401848-40207e lstrcmpiW 889 402084-40208f call 402830 887->889 890 4022ed-4022f9 887->890 893 40db72-40db78 889->893 890->893
                                                                                    APIs
                                                                                    • lstrcmpiW.KERNEL32(?,/chk), ref: 00402076
                                                                                    Strings
                                                                                    • /chk, xrefs: 0040184C
                                                                                    • C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe, xrefs: 00402084
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcmpi
                                                                                    • String ID: /chk$C:\Users\user\AppData\Local\Megasoft DivX Converter 7.1.11\megasoftdivxconverter.exe
                                                                                    • API String ID: 1586166983-3269600232
                                                                                    • Opcode ID: 1fcc37e09c1ea7230a498a40b0b973437d02a2f2e9a4db9a0274fead2a7f7eda
                                                                                    • Instruction ID: 74cbafdec92468c71f0876e0db1c96b0349c7e5a88034ab4a6aa4353a5a9151b
                                                                                    • Opcode Fuzzy Hash: 1fcc37e09c1ea7230a498a40b0b973437d02a2f2e9a4db9a0274fead2a7f7eda
                                                                                    • Instruction Fuzzy Hash: 48E01230E44115DFDB159B64DE49F997BB09B04700F2580F7E0057A1E1C3789E05AB4D

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 894 9b1aa9-9b1ac3 InterlockedIncrement 895 9b1add-9b1ae0 894->895 896 9b1ac5-9b1ad7 WSAStartup InterlockedExchange 894->896 896->895
                                                                                    APIs
                                                                                    • InterlockedIncrement.KERNEL32(009E529C), ref: 009B1ABA
                                                                                    • WSAStartup.WS2_32(00000002,00000000), ref: 009B1ACB
                                                                                    • InterlockedExchange.KERNEL32(009E52A0,00000000), ref: 009B1AD7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009B1000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B1000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9b1000_megasoftdivxconverter.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Interlocked$ExchangeIncrementStartup
                                                                                    • String ID:
                                                                                    • API String ID: 1856147945-0
                                                                                    • Opcode ID: cd6273c76a7d5595d94242cb11688a1e63ad6bcb38635f37d88eb7e7bc7c0031
                                                                                    • Instruction ID: 0b7ae502d37f502c7b4a1197119073110acd8a71f1c8d35de32560c7c309202b
                                                                                    • Opcode Fuzzy Hash: cd6273c76a7d5595d94242cb11688a1e63ad6bcb38635f37d88eb7e7bc7c0031
                                                                                    • Instruction Fuzzy Hash: AED02B31499A041BC11077909D0E978775CD305319F410202FE28C41C0E6416800C292

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 897 4017ba-4017cc LoadLibraryExA 898 4017d2-4017ea 897->898 899 401c67-401c79 897->899 900 401c7a-40d11f 898->900 899->900
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: LibraryLoad
                                                                                    • String ID: KTSw
                                                                                    • API String ID: 1029625771-1494445124
                                                                                    • Opcode ID: 4f2a044669ee3a7f8e557a0fe295be6ccb4efb4d025627d9b6c5b8f632b8761b
                                                                                    • Instruction ID: fd2a1524803d9f791a19ed99706cee7d5fcfa8ce046a4721f3f2475378a41bb1
                                                                                    • Opcode Fuzzy Hash: 4f2a044669ee3a7f8e557a0fe295be6ccb4efb4d025627d9b6c5b8f632b8761b
                                                                                    • Instruction Fuzzy Hash: BE01D274E00218CFDB08CFA8D8A1AEDB7B1BB45751F11816AE812773E0D778A846DB24

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 903 40175a-401761 904 4022a9 903->904 905 401ed7-401eda 904->905 906 4022af-402460 904->906 907 402297-402298 905->907 910 402466-402467 906->910 911 40d52e-40d538 906->911 909 4021e1-4021ec OpenSCManagerA 907->909 912 4021f2-402480 909->912 913 40dded 909->913 914 40ddba-40ddbd 910->914 915 40d5ac 911->915 912->915 917 40ddee 913->917 914->913 915->914 917->917
                                                                                    APIs
                                                                                    • OpenSCManagerA.ADVAPI32(?,?,00000002), ref: 004021E1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: ManagerOpen
                                                                                    • String ID: \
                                                                                    • API String ID: 1889721586-2967466578
                                                                                    • Opcode ID: ab7262ef1a1c113267c03554b46be56ee1e56a79f353c420679976447f28f039
                                                                                    • Instruction ID: 3ec9549b6e352ce66e0eb209fd540e70c3ae76cd918bd22cefb49a509ae65df1
                                                                                    • Opcode Fuzzy Hash: ab7262ef1a1c113267c03554b46be56ee1e56a79f353c420679976447f28f039
                                                                                    • Instruction Fuzzy Hash: D4F08970C0D149FEC7504AA44E5D9FA39A86B11304F3044F79647B25D1D67C4B4AF62F

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 919 401bdf-401d00 RegCloseKey 921 40209c-40d960 call 402940 919->921
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close
                                                                                    • String ID: DivXConverter
                                                                                    • API String ID: 3535843008-4132716239
                                                                                    • Opcode ID: 7593801eb0e49be82e6296bd0d89e7dcf05c3c83ad0ca638d9093b74245f9016
                                                                                    • Instruction ID: 67e54684091948d0756a1cf5eba992663c3e21a0aee559e87b623a49b932659a
                                                                                    • Opcode Fuzzy Hash: 7593801eb0e49be82e6296bd0d89e7dcf05c3c83ad0ca638d9093b74245f9016
                                                                                    • Instruction Fuzzy Hash: 69D0C964D8C510E6E60616D00A04C7A65295945314B31403B6287310E186BD540B77AF

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 927 4016b9-40d993 RegSetValueExA
                                                                                    APIs
                                                                                    • RegSetValueExA.KERNEL32(?,divx_converter_i57,00000000,00000004), ref: 0040D98D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Value
                                                                                    • String ID: divx_converter_i57
                                                                                    • API String ID: 3702945584-1224064743
                                                                                    • Opcode ID: dccdff77034fc0fbb9248a0d4d0d045b576598a7dc9cb3f9f0fb3bc41c3515a3
                                                                                    • Instruction ID: 6731fff5fac9b1ffde77a5bf75cea8f45c13f049f22940bb46bbefbecb9c92f2
                                                                                    • Opcode Fuzzy Hash: dccdff77034fc0fbb9248a0d4d0d045b576598a7dc9cb3f9f0fb3bc41c3515a3
                                                                                    • Instruction Fuzzy Hash: B4C04C74E88114EBDB250EC08E06B9875716B18B09F2104F6B346340D086790A69BE0E

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 930 4016c2-40d835 RegOpenKeyExA
                                                                                    APIs
                                                                                    • RegOpenKeyExA.KERNEL32(80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders), ref: 0040D82F
                                                                                    Strings
                                                                                    • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 004016C2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Open
                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                                    • API String ID: 71445658-2036018995
                                                                                    • Opcode ID: 90e5c35e8936f4e0780e75e1111e9e3f72fb78051c72de30693e0a303eb4fe4d
                                                                                    • Instruction ID: d14074a5c2d983e6dc2ef66f9858a22cd0290d27c0072652025633c19380aabf
                                                                                    • Opcode Fuzzy Hash: 90e5c35e8936f4e0780e75e1111e9e3f72fb78051c72de30693e0a303eb4fe4d
                                                                                    • Instruction Fuzzy Hash: 33B01230604100D5E1041FA10D09B321124BB04701F30403F1503B00C1D93C4019D43F
                                                                                    APIs
                                                                                    • HeapCreate.KERNEL32(00000000,00001000,00000000,00402A7F,00000000), ref: 00403B75
                                                                                      • Part of subcall function 00403A1C: GetVersionExA.KERNEL32 ref: 00403A3B
                                                                                    • HeapDestroy.KERNEL32 ref: 00403BB4
                                                                                      • Part of subcall function 00403F3B: HeapAlloc.KERNEL32(00000000,00000140,00403B9D,000003F8), ref: 00403F48
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Heap$AllocCreateDestroyVersion
                                                                                    • String ID:
                                                                                    • API String ID: 2507506473-0
                                                                                    • Opcode ID: 41655e9e9c0e703031797a4b7b8f832f06af8b7de0b6b38e25141203e3b9edaa
                                                                                    • Instruction ID: 13181fdbc77bd6b5762d4953551df96dffaf81345f3f43d3ea23e6f05a00c699
                                                                                    • Opcode Fuzzy Hash: 41655e9e9c0e703031797a4b7b8f832f06af8b7de0b6b38e25141203e3b9edaa
                                                                                    • Instruction Fuzzy Hash: 58F065706547029ADB101F319E4572A3EA89B4075BF10447FFD00F51D1EFBC9784951D
                                                                                    APIs
                                                                                    • CopyFileA.KERNEL32 ref: 00401ED1
                                                                                    • OpenSCManagerA.ADVAPI32(?,?,00000002), ref: 004021E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: CopyFileManagerOpen
                                                                                    • String ID:
                                                                                    • API String ID: 3059512871-0
                                                                                    • Opcode ID: af7edecfb0c053e48cf1d62ac29af4eb1afbd6a02cdde2f90348ecd5fed2f5fe
                                                                                    • Instruction ID: 1c0398504374640a6dcf7a38702939c3dafa6dd44a2b962941fbdaa50a26c04a
                                                                                    • Opcode Fuzzy Hash: af7edecfb0c053e48cf1d62ac29af4eb1afbd6a02cdde2f90348ecd5fed2f5fe
                                                                                    • Instruction Fuzzy Hash: 1AD0C9A0548002FECA901B905EECD6A79DC5700308B61803AB34AB00D0C97C454EE52E
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32 ref: 0040D32D
                                                                                    • GetModuleFileNameA.KERNEL32(00000000), ref: 0040DD48
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Module$FileHandleName
                                                                                    • String ID:
                                                                                    • API String ID: 4146042529-0
                                                                                    • Opcode ID: f5c27717e5ef41f0f857a2eae5bc6c8ab2a0105bdb2503ae6146b1f7b7bcd180
                                                                                    • Instruction ID: ccbbb6475ca3d18445271a062cd20f9213edf34b9905a092daa81f5f647a0110
                                                                                    • Opcode Fuzzy Hash: f5c27717e5ef41f0f857a2eae5bc6c8ab2a0105bdb2503ae6146b1f7b7bcd180
                                                                                    • Instruction Fuzzy Hash: 32C01279C01209EFC7009FE48A0848836B8AE4C2413228476A28AF2690CA34021AAB3A
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009E8000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E8000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9e8000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3934441357-0
                                                                                    • Opcode ID: 370608fe5a560de2a5eebcf7c6a4ffa2ff74c61e940f50b8d379ed19d9388cf1
                                                                                    • Instruction ID: ef0201a2c393c4b6f2bf5f2eb52f085f0b9b52d32eee1d57fceaa35b0849438b
                                                                                    • Opcode Fuzzy Hash: 370608fe5a560de2a5eebcf7c6a4ffa2ff74c61e940f50b8d379ed19d9388cf1
                                                                                    • Instruction Fuzzy Hash: EE51E7F250C604AFE705AF19DCC17BAB7E9EF94320F16892DE7C587700EA3558448A9B
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009E8000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E8000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9e8000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3934441357-0
                                                                                    • Opcode ID: 08b5696944326e34403644138f8a9bb3955cf4dea82d62ee588e2f2bd76815e6
                                                                                    • Instruction ID: 51160f2c7ae576fe6c70ebcbf7a918aede1953bfcc669924b09d45930de1bb2c
                                                                                    • Opcode Fuzzy Hash: 08b5696944326e34403644138f8a9bb3955cf4dea82d62ee588e2f2bd76815e6
                                                                                    • Instruction Fuzzy Hash: FA415BB250C6009FE315BE19EC827BABBE5EF54720F16492DE7C583640DA35A4508AD7
                                                                                    APIs
                                                                                    • DeleteFileA.KERNEL32(?,254FBF0C), ref: 00A1CB59
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3931477374.00000000009E8000.00000040.00001000.00020000.00000000.sdmp, Offset: 009E8000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_9e8000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: DeleteFile
                                                                                    • String ID:
                                                                                    • API String ID: 4033686569-0
                                                                                    • Opcode ID: 078dc1ab0cec9b89af95c1d6fc9f9c4663dbe8171d306d2f69e442ebdf79d100
                                                                                    • Instruction ID: 950a1bf1b27d6f503fe41ccea82c811dbd6f54e3a1c048fb0f9f3398b6cd1f3c
                                                                                    • Opcode Fuzzy Hash: 078dc1ab0cec9b89af95c1d6fc9f9c4663dbe8171d306d2f69e442ebdf79d100
                                                                                    • Instruction Fuzzy Hash: 9E2187F250C6149FE7157E18EC857BAF7E8EF04320F16092DDAD583780EA35585086D7
                                                                                    APIs
                                                                                    • GetStartupInfoA.KERNEL32(0040BC70), ref: 004016FC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: InfoStartup
                                                                                    • String ID:
                                                                                    • API String ID: 2571198056-0
                                                                                    • Opcode ID: 617dcdd3924f5fd15f13347a6dd3b6e849656fb3a5ef12917dd247dd286985b5
                                                                                    • Instruction ID: 31549c42c345b13d2c96f02d54ffb13a9b858f0819e0063f9234c9623734f819
                                                                                    • Opcode Fuzzy Hash: 617dcdd3924f5fd15f13347a6dd3b6e849656fb3a5ef12917dd247dd286985b5
                                                                                    • Instruction Fuzzy Hash: 22F08130C48208EAE7248AC4DA4566A7670A704309F34043BE903392E0C3BD499AA6DF
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: CopyFile
                                                                                    • String ID:
                                                                                    • API String ID: 1304948518-0
                                                                                    • Opcode ID: dd78076e89e0401475a98f819a82f565ff83797c348f56c25926e712a40ce359
                                                                                    • Instruction ID: c028c9eaedb9a86683d45d109f874a558c9250b022e562fbc3df51ab1a61a941
                                                                                    • Opcode Fuzzy Hash: dd78076e89e0401475a98f819a82f565ff83797c348f56c25926e712a40ce359
                                                                                    • Instruction Fuzzy Hash: EFB01224108102FED1212B900E08D36729C0C28B40321043A1843F00E0D57C500BB13F
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDirectory
                                                                                    • String ID:
                                                                                    • API String ID: 4241100979-0
                                                                                    • Opcode ID: 23ddc9e5edd6b53e1b1f4136a39746dad269bd9863e41c38b4f669bc947767cf
                                                                                    • Instruction ID: a63d933562d00b84030e1b6afa52d7dc68db9c9b6ecb4b8aa01127f168707290
                                                                                    • Opcode Fuzzy Hash: 23ddc9e5edd6b53e1b1f4136a39746dad269bd9863e41c38b4f669bc947767cf
                                                                                    • Instruction Fuzzy Hash: 28A00235589621EBD58147A0DF099BD75545D0972D33240377EC3700E289BD041A6BDF
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExitProcess
                                                                                    • String ID:
                                                                                    • API String ID: 621844428-0
                                                                                    • Opcode ID: d0c3826ff0723c635ed91f33ee8e9590a4913c499c658fce5c591476c82bfad4
                                                                                    • Instruction ID: b1a92c03231e144544f713b417c5859e0f2de9157cf9fa8b01285a905142e745
                                                                                    • Opcode Fuzzy Hash: d0c3826ff0723c635ed91f33ee8e9590a4913c499c658fce5c591476c82bfad4
                                                                                    • Instruction Fuzzy Hash: 68A00261958701EAD38037F1EF0AF3939185B05746F15457BFA9BB40E58D7801095D3F
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: QueryValue
                                                                                    • String ID:
                                                                                    • API String ID: 3660427363-0
                                                                                    • Opcode ID: b391aa9fe3ea210b1cee81e040c1f758445676d51f93ab7188548a7420ecf128
                                                                                    • Instruction ID: 3bd42a71b03534167308f0cbd5da6460ad747fd4e0c7a7375ad2f4210d01ae57
                                                                                    • Opcode Fuzzy Hash: b391aa9fe3ea210b1cee81e040c1f758445676d51f93ab7188548a7420ecf128
                                                                                    • Instruction Fuzzy Hash: 059002246045019AE6104E315A08315255465847517A2483A5493E2060DA3880456519
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: 383b7650d2ee7e5ada3e4db234f584aaabeebbe9374209253395a3b32b5a6f81
                                                                                    • Instruction ID: 07d2f82f72fc2e31263e526b7b5b13d85737a981482a0a25e669d48976ba73c6
                                                                                    • Opcode Fuzzy Hash: 383b7650d2ee7e5ada3e4db234f584aaabeebbe9374209253395a3b32b5a6f81
                                                                                    • Instruction Fuzzy Hash: 3C9002202045019BD2000A315E0871535546605749B1548395443E1060DA3680055919
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Close
                                                                                    • String ID:
                                                                                    • API String ID: 3535843008-0
                                                                                    • Opcode ID: 8f007f69e061bd422a53f48b80ceed0a1a374071a83d77b918650b57a5cd535f
                                                                                    • Instruction ID: dec88964b932671aa77eca6bc69d32e9a32eec2e664996911c6cd1e039071611
                                                                                    • Opcode Fuzzy Hash: 8f007f69e061bd422a53f48b80ceed0a1a374071a83d77b918650b57a5cd535f
                                                                                    • Instruction Fuzzy Hash:
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcmpi
                                                                                    • String ID:
                                                                                    • API String ID: 1586166983-0
                                                                                    • Opcode ID: 85e5d253e75483d50bd31de290fb2bf395d6d4dd5cdd4da3a6f7b01d90c409f5
                                                                                    • Instruction ID: 0e395745e38f9bd276d1320349e90d054343714417637c74239275d290802098
                                                                                    • Opcode Fuzzy Hash: 85e5d253e75483d50bd31de290fb2bf395d6d4dd5cdd4da3a6f7b01d90c409f5
                                                                                    • Instruction Fuzzy Hash: C1115B34920615CBD750EF25EE887AA73B4FB0A341F1080B5D949B62A1C7389D4ADF4C
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040), ref: 0040DD00
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 5be6704718b93ff92afc96952609f6e6387096737fb5b7c84385c1961137f368
                                                                                    • Instruction ID: 3b205df3594c415d0aa8bec0432e9a599be535e783554e68ad17295cc5f33824
                                                                                    • Opcode Fuzzy Hash: 5be6704718b93ff92afc96952609f6e6387096737fb5b7c84385c1961137f368
                                                                                    • Instruction Fuzzy Hash: 5ED09274A44204EFEB048FD4D895BADBFB0BB08700F10106AE601BA290D37569819B19
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000040), ref: 0040DD00
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 8b23f1f67c5f5566f300e7ac74bae4201891eaa614364e91549a7b481efbae26
                                                                                    • Instruction ID: 8af6f96ece145710be5535b4e3cdc8dee21da37ab7613c5e1b542e0a2ec452ac
                                                                                    • Opcode Fuzzy Hash: 8b23f1f67c5f5566f300e7ac74bae4201891eaa614364e91549a7b481efbae26
                                                                                    • Instruction Fuzzy Hash: 64D0C9B4C05115EFC7048FA4954416CBAB4AF15340720143A9882B6251D33816099B1A
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Sleep
                                                                                    • String ID:
                                                                                    • API String ID: 3472027048-0
                                                                                    • Opcode ID: 1b0567d54f0c0edf03da95ed6b3a6a73757f0bdfb125eac6e6710510bc4a4ac9
                                                                                    • Instruction ID: 00643d4d7351e9e5a350d6ed7ca8ab589594b51d6e4f39196c4da74e668ef2ca
                                                                                    • Opcode Fuzzy Hash: 1b0567d54f0c0edf03da95ed6b3a6a73757f0bdfb125eac6e6710510bc4a4ac9
                                                                                    • Instruction Fuzzy Hash: 8AC002B0A44544EFDB459BB8CE49E6DBBB8AB44300B1101A1F905F61A5CB389F49AA19
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3930564760.0000000000400000.00000040.00000001.01000000.00000009.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3930564760.000000000040B000.00000040.00000001.01000000.00000009.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_400000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Sleep
                                                                                    • String ID:
                                                                                    • API String ID: 3472027048-0
                                                                                    • Opcode ID: 18d500e894f671b989adec932e8be24e82ce215b7d72d1c5409f2e9720ba9509
                                                                                    • Instruction ID: 9f60c22d136c83975ad332161802ba9d1f8d3b96565a4f4b2bdefaede1a81fb0
                                                                                    • Opcode Fuzzy Hash: 18d500e894f671b989adec932e8be24e82ce215b7d72d1c5409f2e9720ba9509
                                                                                    • Instruction Fuzzy Hash: 82B012B8699B0397E3141A68AE2976417604F007A4F211837E707F84E0CBBEE146592E
                                                                                    APIs
                                                                                    • sqlite3_malloc.SQLITE3 ref: 609674C6
                                                                                      • Part of subcall function 60916FBA: sqlite3_initialize.SQLITE3(60912743,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5), ref: 60916FC4
                                                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                    • sqlite3_step.SQLITE3 ref: 6096755A
                                                                                    • sqlite3_malloc.SQLITE3 ref: 6096783A
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 609678A8
                                                                                    • sqlite3_column_bytes.SQLITE3 ref: 609678E8
                                                                                    • sqlite3_column_blob.SQLITE3 ref: 60967901
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 6096791A
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 60967931
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 60967950
                                                                                    • sqlite3_step.SQLITE3 ref: 609679C3
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 60967AA9
                                                                                    • sqlite3_step.SQLITE3 ref: 60967AB4
                                                                                    • sqlite3_column_int.SQLITE3 ref: 60967AC7
                                                                                    • sqlite3_reset.SQLITE3 ref: 60967AD4
                                                                                    • sqlite3_bind_int.SQLITE3 ref: 60967B89
                                                                                    • sqlite3_step.SQLITE3 ref: 60967B94
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 60967BB0
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 60967BCF
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 60967BE6
                                                                                    • sqlite3_column_bytes.SQLITE3 ref: 60967C05
                                                                                    • sqlite3_column_blob.SQLITE3 ref: 60967C1E
                                                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED50
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 60967C72
                                                                                    • sqlite3_step.SQLITE3 ref: 60967C7D
                                                                                    • memcmp.MSVCRT ref: 60967D4C
                                                                                    • sqlite3_free.SQLITE3 ref: 60967D69
                                                                                    • sqlite3_free.SQLITE3 ref: 60967D74
                                                                                    • sqlite3_free.SQLITE3 ref: 60967FF7
                                                                                    • sqlite3_free.SQLITE3 ref: 60968002
                                                                                      • Part of subcall function 609634F0: sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                                                      • Part of subcall function 609634F0: sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                                                      • Part of subcall function 609634F0: sqlite3_malloc.SQLITE3 ref: 609635BB
                                                                                      • Part of subcall function 609634F0: sqlite3_blob_read.SQLITE3 ref: 60963602
                                                                                      • Part of subcall function 609634F0: sqlite3_free.SQLITE3 ref: 60963621
                                                                                    • sqlite3_reset.SQLITE3 ref: 60967C93
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                    • sqlite3_reset.SQLITE3 ref: 60967CA7
                                                                                    • sqlite3_reset.SQLITE3 ref: 60968035
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 60967B72
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6096809D
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 609680C6
                                                                                    • sqlite3_step.SQLITE3 ref: 609680D1
                                                                                    • sqlite3_column_int.SQLITE3 ref: 609680F3
                                                                                    • sqlite3_reset.SQLITE3 ref: 60968104
                                                                                    • sqlite3_step.SQLITE3 ref: 60968139
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 60968151
                                                                                    • sqlite3_reset.SQLITE3 ref: 6096818A
                                                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED2B
                                                                                      • Part of subcall function 6095ECA6: sqlite3_bind_value.SQLITE3 ref: 6095EDDF
                                                                                    • sqlite3_reset.SQLITE3 ref: 609679E9
                                                                                      • Part of subcall function 609160CD: sqlite3_realloc.SQLITE3 ref: 609160EF
                                                                                    • sqlite3_column_bytes.SQLITE3 ref: 60967587
                                                                                      • Part of subcall function 6091D5DC: sqlite3_value_bytes.SQLITE3 ref: 6091D5F4
                                                                                    • sqlite3_column_blob.SQLITE3 ref: 60967572
                                                                                      • Part of subcall function 6091D57E: sqlite3_value_blob.SQLITE3 ref: 6091D596
                                                                                    • sqlite3_reset.SQLITE3 ref: 609675B7
                                                                                    • sqlite3_bind_int.SQLITE3 ref: 60967641
                                                                                    • sqlite3_step.SQLITE3 ref: 6096764C
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 6096766E
                                                                                    • sqlite3_reset.SQLITE3 ref: 6096768B
                                                                                    • sqlite3_bind_int.SQLITE3 ref: 6096754F
                                                                                      • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                    • sqlite3_bind_int.SQLITE3 ref: 609690B2
                                                                                    • sqlite3_bind_blob.SQLITE3 ref: 609690DB
                                                                                    • sqlite3_step.SQLITE3 ref: 609690E6
                                                                                    • sqlite3_reset.SQLITE3 ref: 609690F1
                                                                                    • sqlite3_free.SQLITE3 ref: 60969102
                                                                                    • sqlite3_free.SQLITE3 ref: 6096910D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_reset$sqlite3_step$sqlite3_column_int64sqlite3_free$sqlite3_bind_int64$sqlite3_bind_int$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mprintf$sqlite3_column_intsqlite3_mutex_leave$memcmpsqlite3_bind_blobsqlite3_bind_valuesqlite3_blob_bytessqlite3_blob_readsqlite3_blob_reopensqlite3_initializesqlite3_mutex_entersqlite3_prepare_v2sqlite3_reallocsqlite3_value_blobsqlite3_value_bytes
                                                                                    • String ID: $d
                                                                                    • API String ID: 2451604321-2084297493
                                                                                    • Opcode ID: 8a4e51d2763d1baa8146902d495da2ef892242416c9706ebfa3093aedc646825
                                                                                    • Instruction ID: 6b7ea73e19bc996eb6a422b8fcf26663d3cb25e4dd91ceba81a4d6a678ae72ab
                                                                                    • Opcode Fuzzy Hash: 8a4e51d2763d1baa8146902d495da2ef892242416c9706ebfa3093aedc646825
                                                                                    • Instruction Fuzzy Hash: 2CF2CF74A152288FDB54CF68C980B9EBBF2BF69304F1185A9E888A7341D774ED85CF41
                                                                                    APIs
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6096A64C
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6096A656
                                                                                    • sqlite3_strnicmp.SQLITE3 ref: 6096A682
                                                                                    • sqlite3_strnicmp.SQLITE3 ref: 6096A6BC
                                                                                    • sqlite3_mprintf.SQLITE3 ref: 6096A6F9
                                                                                    • sqlite3_malloc.SQLITE3 ref: 6096A754
                                                                                    • sqlite3_step.SQLITE3 ref: 6096A969
                                                                                    • sqlite3_free.SQLITE3 ref: 6096A9AC
                                                                                    • sqlite3_finalize.SQLITE3 ref: 6096A9BB
                                                                                    • sqlite3_strnicmp.SQLITE3 ref: 6096B04A
                                                                                      • Part of subcall function 6096A38C: sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                      • Part of subcall function 6096A38C: sqlite3_step.SQLITE3 ref: 6096A435
                                                                                      • Part of subcall function 6096A38C: sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                    • sqlite3_value_int.SQLITE3 ref: 6096B241
                                                                                    • sqlite3_malloc.SQLITE3 ref: 6096B270
                                                                                    • sqlite3_bind_null.SQLITE3 ref: 6096B2DF
                                                                                    • sqlite3_step.SQLITE3 ref: 6096B2EA
                                                                                    • sqlite3_reset.SQLITE3 ref: 6096B2F5
                                                                                    • sqlite3_value_int.SQLITE3 ref: 6096B43B
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6096B530
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6096B576
                                                                                    • sqlite3_free.SQLITE3 ref: 6096B5F4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_stepsqlite3_strnicmp$sqlite3_freesqlite3_mallocsqlite3_resetsqlite3_value_bytessqlite3_value_intsqlite3_value_text$sqlite3_bind_intsqlite3_bind_nullsqlite3_finalizesqlite3_mprintf
                                                                                    • String ID: optimize
                                                                                    • API String ID: 1540667495-3797040228
                                                                                    • Opcode ID: ab382b16e3f59fac809a38361d516dac1e6c4c02a096abfb60effccae4f38c9b
                                                                                    • Instruction ID: 15d53f9c7948a495e2c6926a79545eea34293df74e7a3e63ea56b3727437b729
                                                                                    • Opcode Fuzzy Hash: ab382b16e3f59fac809a38361d516dac1e6c4c02a096abfb60effccae4f38c9b
                                                                                    • Instruction Fuzzy Hash: 54B2F670A142198FEB14DF68C890B9DBBF6BF68304F1085A9E889AB351E774DD85CF41
                                                                                    APIs
                                                                                    • sqlite3_finalize.SQLITE3 ref: 60966178
                                                                                    • sqlite3_free.SQLITE3 ref: 60966183
                                                                                    • sqlite3_value_numeric_type.SQLITE3 ref: 609661AE
                                                                                    • sqlite3_value_numeric_type.SQLITE3 ref: 609661DE
                                                                                    • sqlite3_value_text.SQLITE3 ref: 60966236
                                                                                    • sqlite3_value_int.SQLITE3 ref: 60966274
                                                                                    • memcmp.MSVCRT ref: 6096639E
                                                                                      • Part of subcall function 60940A5B: sqlite3_malloc.SQLITE3 ref: 60940AA1
                                                                                      • Part of subcall function 60940A5B: sqlite3_free.SQLITE3 ref: 60940C1D
                                                                                    • sqlite3_mprintf.SQLITE3 ref: 60966B51
                                                                                    • sqlite3_mprintf.SQLITE3 ref: 60966B7D
                                                                                      • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                                                      • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_numeric_type$memcmpsqlite3_finalizesqlite3_initializesqlite3_mallocsqlite3_value_intsqlite3_value_textsqlite3_vmprintf
                                                                                    • String ID: ASC$DESC$x
                                                                                    • API String ID: 4082667235-1162196452
                                                                                    • Opcode ID: 7264e4280a4ba67b830c3238f8418230a53be4a89f04bb086879d88682624c0f
                                                                                    • Instruction ID: 01f4316cc9c65235d83944c747b96ccca9397e1276bdc6c450b31a73d7ca280a
                                                                                    • Opcode Fuzzy Hash: 7264e4280a4ba67b830c3238f8418230a53be4a89f04bb086879d88682624c0f
                                                                                    • Instruction Fuzzy Hash: AD921274A14319CFEB10CFA9C99079DBBB6BF69304F20816AD858AB342D774E985CF41
                                                                                    APIs
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6096882B
                                                                                    • sqlite3_bind_int.SQLITE3 ref: 60968842
                                                                                    • sqlite3_step.SQLITE3 ref: 6096884D
                                                                                    • sqlite3_reset.SQLITE3 ref: 60968858
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 60968907
                                                                                    • sqlite3_bind_int.SQLITE3 ref: 60968924
                                                                                    • sqlite3_step.SQLITE3 ref: 6096892F
                                                                                    • sqlite3_column_blob.SQLITE3 ref: 60968947
                                                                                    • sqlite3_column_bytes.SQLITE3 ref: 6096895C
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 60968975
                                                                                    • sqlite3_reset.SQLITE3 ref: 609689B0
                                                                                      • Part of subcall function 609634F0: sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                                                      • Part of subcall function 609634F0: sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                                                      • Part of subcall function 609634F0: sqlite3_malloc.SQLITE3 ref: 609635BB
                                                                                      • Part of subcall function 609634F0: sqlite3_blob_read.SQLITE3 ref: 60963602
                                                                                      • Part of subcall function 609634F0: sqlite3_free.SQLITE3 ref: 60963621
                                                                                    • sqlite3_free.SQLITE3 ref: 60968A68
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 60968B00
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 60968B2D
                                                                                    • sqlite3_step.SQLITE3 ref: 60968B38
                                                                                    • sqlite3_reset.SQLITE3 ref: 60968B43
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 60968B9F
                                                                                    • sqlite3_bind_blob.SQLITE3 ref: 60968BC8
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 60968BEF
                                                                                    • sqlite3_bind_int.SQLITE3 ref: 60968C0C
                                                                                    • sqlite3_step.SQLITE3 ref: 60968C17
                                                                                    • sqlite3_reset.SQLITE3 ref: 60968C22
                                                                                    • sqlite3_free.SQLITE3 ref: 60968C2F
                                                                                    • sqlite3_free.SQLITE3 ref: 60968C3A
                                                                                      • Part of subcall function 60916390: sqlite3_free.SQLITE3 ref: 609164E9
                                                                                      • Part of subcall function 60916390: sqlite3_free.SQLITE3 ref: 609164F4
                                                                                      • Part of subcall function 6095F772: sqlite3_bind_int64.SQLITE3 ref: 6095F7AC
                                                                                      • Part of subcall function 6095F772: sqlite3_bind_blob.SQLITE3 ref: 6095F7D5
                                                                                      • Part of subcall function 6095F772: sqlite3_step.SQLITE3 ref: 6095F7E0
                                                                                      • Part of subcall function 6095F772: sqlite3_reset.SQLITE3 ref: 6095F7EB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64$sqlite3_free$sqlite3_resetsqlite3_step$sqlite3_bind_int$sqlite3_bind_blob$sqlite3_blob_bytessqlite3_blob_readsqlite3_blob_reopensqlite3_column_blobsqlite3_column_bytessqlite3_column_int64sqlite3_malloc
                                                                                    • String ID:
                                                                                    • API String ID: 2526640242-0
                                                                                    • Opcode ID: 80c4178694f9100467d9f8914e06a53f74e1fc263bd09a9052fbc3a5e85adfd3
                                                                                    • Instruction ID: ecb2fadc30329ad4410b738d56806f6ecd0ac298638076f7c65242d8805d2ed1
                                                                                    • Opcode Fuzzy Hash: 80c4178694f9100467d9f8914e06a53f74e1fc263bd09a9052fbc3a5e85adfd3
                                                                                    • Instruction Fuzzy Hash: A0D1C2B4A153189FDB14DF68C884B8EBBF2BFA9304F118599E888A7344E774D985CF41
                                                                                    APIs
                                                                                    • sqlite3_bind_int64.SQLITE3(?,?), ref: 609693A5
                                                                                    • sqlite3_step.SQLITE3(?,?), ref: 609693B0
                                                                                    • sqlite3_column_int64.SQLITE3(?,?), ref: 609693DC
                                                                                      • Part of subcall function 6096A2BD: sqlite3_bind_int64.SQLITE3 ref: 6096A322
                                                                                      • Part of subcall function 6096A2BD: sqlite3_step.SQLITE3 ref: 6096A32D
                                                                                      • Part of subcall function 6096A2BD: sqlite3_column_int.SQLITE3 ref: 6096A347
                                                                                      • Part of subcall function 6096A2BD: sqlite3_reset.SQLITE3 ref: 6096A354
                                                                                    • sqlite3_reset.SQLITE3(?,?), ref: 609693F3
                                                                                    • sqlite3_malloc.SQLITE3(?), ref: 60969561
                                                                                    • sqlite3_malloc.SQLITE3(?), ref: 6096958D
                                                                                    • sqlite3_step.SQLITE3(?), ref: 609695D2
                                                                                    • sqlite3_column_int64.SQLITE3(?), ref: 609695EA
                                                                                    • sqlite3_reset.SQLITE3(?), ref: 60969604
                                                                                    • sqlite3_realloc.SQLITE3(?), ref: 609697D0
                                                                                    • sqlite3_realloc.SQLITE3(?), ref: 609698A9
                                                                                      • Part of subcall function 609129D5: sqlite3_initialize.SQLITE3(?,?,?,60915F55,?,?,?,?,?,?,00000000,?,?,?,60915FE2,00000000), ref: 609129E0
                                                                                    • sqlite3_bind_int64.SQLITE3(?,?), ref: 609699B8
                                                                                    • sqlite3_bind_int64.SQLITE3(?), ref: 6096934D
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    • sqlite3_bind_int64.SQLITE3(?,?), ref: 60969A6A
                                                                                    • sqlite3_step.SQLITE3(?,?), ref: 60969A75
                                                                                    • sqlite3_reset.SQLITE3(?,?), ref: 60969A80
                                                                                    • sqlite3_free.SQLITE3(?), ref: 60969D41
                                                                                    • sqlite3_free.SQLITE3(?), ref: 60969D4C
                                                                                    • sqlite3_free.SQLITE3(?), ref: 60969D5B
                                                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64$sqlite3_freesqlite3_resetsqlite3_step$sqlite3_column_int64sqlite3_mallocsqlite3_realloc$sqlite3_column_intsqlite3_initializesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2
                                                                                    • String ID:
                                                                                    • API String ID: 961572588-0
                                                                                    • Opcode ID: c724daf3936d67fd3e7a59374d144345718a9f8d9c21f3c7abba70c9fa35c0f4
                                                                                    • Instruction ID: dba6eef834311e7f80380fc62c490a647dd1765b4da9a7e0a506f520bf28697a
                                                                                    • Opcode Fuzzy Hash: c724daf3936d67fd3e7a59374d144345718a9f8d9c21f3c7abba70c9fa35c0f4
                                                                                    • Instruction Fuzzy Hash: 9872F275A042298FDB24CF69C88078DB7F6FF98314F1586A9D889AB341D774AD81CF81
                                                                                    APIs
                                                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F8E5
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    • sqlite3_bind_int.SQLITE3 ref: 6095F8FF
                                                                                      • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F920
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F941
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F962
                                                                                    • sqlite3_bind_blob.SQLITE3 ref: 6095F98B
                                                                                    • sqlite3_step.SQLITE3 ref: 6095F996
                                                                                    • sqlite3_reset.SQLITE3 ref: 6095F9A1
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64$sqlite3_mutex_leave$sqlite3_bind_blobsqlite3_bind_intsqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 1154799056-0
                                                                                    • Opcode ID: e44b370a1dfa701ff5b9885cc4cf0a2423246689aee604e01ba9336684cc4512
                                                                                    • Instruction ID: 4c6ccefb8af807723b251ff764995e511564b2c054836566e23fd100615de26c
                                                                                    • Opcode Fuzzy Hash: e44b370a1dfa701ff5b9885cc4cf0a2423246689aee604e01ba9336684cc4512
                                                                                    • Instruction Fuzzy Hash: A3415DB4908708AFCB04DF69D18469EBBF1EF98314F11C91AE898A7344E775D9448F92
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64sqlite3_mutex_leavesqlite3_stricmp
                                                                                    • String ID: 2$foreign key$indexed
                                                                                    • API String ID: 4126863092-702264400
                                                                                    • Opcode ID: efb0247afb620838301bdf32ec29a55ffab8ab84c5461d6934eb6e15b590f11f
                                                                                    • Instruction ID: 3d5d194cd292e354de8359ea213fef7e5121ae3f60f7d2d7ba557b44893e8b9c
                                                                                    • Opcode Fuzzy Hash: efb0247afb620838301bdf32ec29a55ffab8ab84c5461d6934eb6e15b590f11f
                                                                                    • Instruction Fuzzy Hash: 6BE1B374A142099FDB04CFA8D590A9DBBF2BFA9304F21C129E855AB754DB35ED82CF40
                                                                                    APIs
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094A72B
                                                                                    • sqlite3_step.SQLITE3 ref: 6094A73C
                                                                                    • sqlite3_column_blob.SQLITE3 ref: 6094A760
                                                                                    • sqlite3_column_bytes.SQLITE3 ref: 6094A77C
                                                                                    • sqlite3_malloc.SQLITE3 ref: 6094A793
                                                                                    • sqlite3_reset.SQLITE3 ref: 6094A7F2
                                                                                    • sqlite3_free.SQLITE3(?), ref: 6094A87C
                                                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64sqlite3_column_blobsqlite3_column_bytessqlite3_freesqlite3_mallocsqlite3_mutex_entersqlite3_resetsqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 2794791986-0
                                                                                    • Opcode ID: 324244e72ed1eb068e97444324dd06558e7f5640642cd65f7376e38a8826fd77
                                                                                    • Instruction ID: 088d5e00ded46b3eb5457b54e5d33bc48436a4b712d77f6ae5dc1ca3eb859b7b
                                                                                    • Opcode Fuzzy Hash: 324244e72ed1eb068e97444324dd06558e7f5640642cd65f7376e38a8826fd77
                                                                                    • Instruction Fuzzy Hash: BE5110B5A042058FCB04CF69C48069ABBF6FF68318F158569E858AB345D734EC82CF90
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_stricmp
                                                                                    • String ID: USING COVERING INDEX $DISTINCT$ORDER BY
                                                                                    • API String ID: 912767213-1308749736
                                                                                    • Opcode ID: 5e6ae8a77223c4cf3853263767bd84c2ef0a0cb2633a4755bdfaa367f33b2fd5
                                                                                    • Instruction ID: 4f43644a9add5c5df618cbd47cd61ce2203d262f2077f605e752fe25420d36ab
                                                                                    • Opcode Fuzzy Hash: 5e6ae8a77223c4cf3853263767bd84c2ef0a0cb2633a4755bdfaa367f33b2fd5
                                                                                    • Instruction Fuzzy Hash: 2412D674A08268CFDB25DF28C880B5AB7B3AFA9314F1085E9E8899B355D774DD81CF41
                                                                                    APIs
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B488
                                                                                    • sqlite3_step.SQLITE3 ref: 6094B496
                                                                                    • sqlite3_reset.SQLITE3 ref: 6094B4A4
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B4D2
                                                                                    • sqlite3_step.SQLITE3 ref: 6094B4E0
                                                                                    • sqlite3_reset.SQLITE3 ref: 6094B4EE
                                                                                      • Part of subcall function 6094B54C: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64sqlite3_resetsqlite3_step$memmove
                                                                                    • String ID:
                                                                                    • API String ID: 4082478743-0
                                                                                    • Opcode ID: aa77e302053f557c70a8d8c80c1bb3ccc0b69d7e46be98bddd9db9cb48891f7f
                                                                                    • Instruction ID: 9e7f29540a3c6f2d28ce6b101cd1a975f5529a8f599b89b7128c34d749e8d9ce
                                                                                    • Opcode Fuzzy Hash: aa77e302053f557c70a8d8c80c1bb3ccc0b69d7e46be98bddd9db9cb48891f7f
                                                                                    • Instruction Fuzzy Hash: DD41D2B4A087018FCB50DF69C484A9EB7F6EFA8364F158929EC99CB315E734E8418F51
                                                                                    APIs
                                                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6094D354
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6094D546
                                                                                      • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905D8B
                                                                                      • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905DA4
                                                                                      • Part of subcall function 60905D76: sqlite3_stricmp.SQLITE3 ref: 60905DB8
                                                                                    • sqlite3_stricmp.SQLITE3 ref: 6094D3DA
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_stricmp$sqlite3_mutex_entersqlite3_mutex_leave
                                                                                    • String ID: BINARY$INTEGER
                                                                                    • API String ID: 317512412-1676293250
                                                                                    • Opcode ID: a7efc97792d1e6a4bc5cda92ab6d03f9066f32250883ff14ac0274f07e3e06bf
                                                                                    • Instruction ID: cace79839434994537c0410bddb438ad3d501bddbf1b20fcc6a8a8bdb5da7fdd
                                                                                    • Opcode Fuzzy Hash: a7efc97792d1e6a4bc5cda92ab6d03f9066f32250883ff14ac0274f07e3e06bf
                                                                                    • Instruction Fuzzy Hash: 8E712978A056099BDB05CF69C49079EBBF2BFA8308F11C529EC55AB3A4D734E941CF80
                                                                                    APIs
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B582
                                                                                    • sqlite3_step.SQLITE3 ref: 6094B590
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 6094B5AD
                                                                                    • sqlite3_reset.SQLITE3 ref: 6094B5EE
                                                                                    • memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: memmovesqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 2802900177-0
                                                                                    • Opcode ID: f7dd783d858009ac2aa36dfb06bc3a4e86bc75c1920f7d1bf53ec4d0fe99899e
                                                                                    • Instruction ID: fa681a173a9aa7ad5377a8f3376375fc0286f70c891b696e42c92f52458a3a0e
                                                                                    • Opcode Fuzzy Hash: f7dd783d858009ac2aa36dfb06bc3a4e86bc75c1920f7d1bf53ec4d0fe99899e
                                                                                    • Instruction Fuzzy Hash: 0B517D75A082018FCB14CF69C48169EF7F7FBA8314F25C669D8499B318EA74EC81CB81
                                                                                    APIs
                                                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6093F443
                                                                                      • Part of subcall function 60904396: sqlite3_mutex_try.SQLITE3(?,?,?,60908235), ref: 609043B8
                                                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6093F45C
                                                                                      • Part of subcall function 60939559: memcmp.MSVCRT ref: 60939694
                                                                                      • Part of subcall function 60939559: memcmp.MSVCRT ref: 609396CA
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6093F8CD
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6093F8E3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcmpsqlite3_mutex_entersqlite3_mutex_leave$sqlite3_mutex_try
                                                                                    • String ID:
                                                                                    • API String ID: 4038589952-0
                                                                                    • Opcode ID: 29e5932b9866e1e5e2fcd92ac707fe98724786dada8c9b11deae4621e05e1fb7
                                                                                    • Instruction ID: 916146ddc5613ce70bfe97dc7fabc38680eb49f4f4fdba01105907ea2da9c682
                                                                                    • Opcode Fuzzy Hash: 29e5932b9866e1e5e2fcd92ac707fe98724786dada8c9b11deae4621e05e1fb7
                                                                                    • Instruction Fuzzy Hash: 87F13674A046158FDB18CFA9C590A9EB7F7AFA8308F248429E846AB355D774EC42CF40
                                                                                    APIs
                                                                                      • Part of subcall function 6094A894: sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                                                      • Part of subcall function 6094A894: sqlite3_step.SQLITE3 ref: 6094A8CE
                                                                                      • Part of subcall function 6094A894: sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                                                      • Part of subcall function 6094A894: sqlite3_reset.SQLITE3 ref: 6094A90F
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094C719
                                                                                    • sqlite3_step.SQLITE3 ref: 6094C72A
                                                                                    • sqlite3_reset.SQLITE3 ref: 6094C73B
                                                                                      • Part of subcall function 6094B54C: memmove.MSVCRT(?,?,?,?,?,?,?,?,00000000,?,6094B44B), ref: 6094B6B5
                                                                                      • Part of subcall function 6094A9F5: sqlite3_free.SQLITE3 ref: 6094AA7A
                                                                                    • sqlite3_free.SQLITE3 ref: 6094C881
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64sqlite3_freesqlite3_resetsqlite3_step$memmovesqlite3_column_int64
                                                                                    • String ID:
                                                                                    • API String ID: 3487101843-0
                                                                                    • Opcode ID: 5f7c6ccdcb237f7a487fb09799aacf08d073da1bf61c53431d7ccff799043987
                                                                                    • Instruction ID: dadb85a3919e548a164012fc2e04d9b0ab11445217433cc10b515e99a95ed5c3
                                                                                    • Opcode Fuzzy Hash: 5f7c6ccdcb237f7a487fb09799aacf08d073da1bf61c53431d7ccff799043987
                                                                                    • Instruction Fuzzy Hash: 3681FA74A046098FCB44DF99C480A9DF7F7AFA8354F258529E855AB314EB34EC46CF90
                                                                                    APIs
                                                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                    • sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                      • Part of subcall function 609256E5: sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                    • sqlite3_column_int.SQLITE3 ref: 6096A3F3
                                                                                    • sqlite3_step.SQLITE3 ref: 6096A435
                                                                                    • sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_intsqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 247099642-0
                                                                                    • Opcode ID: 64427881e425bd4a7d2fa305579facb0dd1ab8a71ce9f1271cd8f49c57a97bec
                                                                                    • Instruction ID: 69535c0605dcb565d56369453fd68d3a3097adfd173720c6e67b3d4aca8354ad
                                                                                    • Opcode Fuzzy Hash: 64427881e425bd4a7d2fa305579facb0dd1ab8a71ce9f1271cd8f49c57a97bec
                                                                                    • Instruction Fuzzy Hash: FF2151B0A143148BEB109FA9D88479EB7FAEF64308F00852DE89597350EBB8D845CF51
                                                                                    APIs
                                                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6096A322
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    • sqlite3_step.SQLITE3 ref: 6096A32D
                                                                                    • sqlite3_column_int.SQLITE3 ref: 6096A347
                                                                                      • Part of subcall function 6091D4F4: sqlite3_value_int.SQLITE3 ref: 6091D50C
                                                                                    • sqlite3_reset.SQLITE3 ref: 6096A354
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64sqlite3_column_intsqlite3_freesqlite3_mprintfsqlite3_mutex_leavesqlite3_prepare_v2sqlite3_resetsqlite3_stepsqlite3_value_int
                                                                                    • String ID:
                                                                                    • API String ID: 326482775-0
                                                                                    • Opcode ID: de94f0bba3b8b54078f1ceecce583a965f8e010bb36370f6070bcd8bc28ee8b0
                                                                                    • Instruction ID: 7c1586c82cd56d85cf32929a5cd575737867df940847ca2bf63216634e784e33
                                                                                    • Opcode Fuzzy Hash: de94f0bba3b8b54078f1ceecce583a965f8e010bb36370f6070bcd8bc28ee8b0
                                                                                    • Instruction Fuzzy Hash: 0E214DB0A043049BDB04DFA9C480B9EF7FAEFA8354F04C429E8959B340E778D8418B51
                                                                                    APIs
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    • sqlite3_step.SQLITE3 ref: 6094A8CE
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                                                    • sqlite3_reset.SQLITE3 ref: 6094A90F
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_leave$sqlite3_bind_int64sqlite3_column_int64sqlite3_mutex_entersqlite3_resetsqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 3728028068-0
                                                                                    • Opcode ID: 4480569ff34e75ea7b3577054b4356c5dff4901ba2a75f55588298fac9ec1789
                                                                                    • Instruction ID: ee155327ad46b109c371b626633bea00b74b78c8347343cda40424352d7c4f30
                                                                                    • Opcode Fuzzy Hash: 4480569ff34e75ea7b3577054b4356c5dff4901ba2a75f55588298fac9ec1789
                                                                                    • Instruction Fuzzy Hash: 31010C7060A3009FDB00EF2CC48539ABBE5EF64358F15887DE88C8B345E775D8508B82
                                                                                    APIs
                                                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F83D
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F85E
                                                                                    • sqlite3_step.SQLITE3 ref: 6095F869
                                                                                    • sqlite3_reset.SQLITE3 ref: 6095F874
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64sqlite3_mutex_leave$sqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 2747803115-0
                                                                                    • Opcode ID: e7ba5a424be07f97404f27e37360827cc19527dc01f9216413d7b5c44ff8a2c2
                                                                                    • Instruction ID: f00e87c6dd3c8672f4b8fa92d33f96d93ee8ab4b9f2e93312e2458fba8eee522
                                                                                    • Opcode Fuzzy Hash: e7ba5a424be07f97404f27e37360827cc19527dc01f9216413d7b5c44ff8a2c2
                                                                                    • Instruction Fuzzy Hash: 9311DBB4A046049FCB04DF69C0C565AF7F6EFA8318F05C869E8898B349E735E894CB91
                                                                                    APIs
                                                                                      • Part of subcall function 6095ECA6: sqlite3_mprintf.SQLITE3 ref: 6095ED06
                                                                                      • Part of subcall function 6095ECA6: sqlite3_prepare_v2.SQLITE3 ref: 6095ED8D
                                                                                      • Part of subcall function 6095ECA6: sqlite3_free.SQLITE3 ref: 6095ED9B
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6095F7AC
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    • sqlite3_bind_blob.SQLITE3 ref: 6095F7D5
                                                                                    • sqlite3_step.SQLITE3 ref: 6095F7E0
                                                                                    • sqlite3_reset.SQLITE3 ref: 6095F7EB
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_leave$sqlite3_bind_blobsqlite3_bind_int64sqlite3_freesqlite3_mprintfsqlite3_mutex_entersqlite3_prepare_v2sqlite3_resetsqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 1956248851-0
                                                                                    • Opcode ID: 50d15a15163a625fc2631aa0d6ee46575d14479fce2c17ccb278089255f39c88
                                                                                    • Instruction ID: 4081a9388348d49f983bc2db4af636c0e8f58482a36dc41ad0278772ae94fdf0
                                                                                    • Opcode Fuzzy Hash: 50d15a15163a625fc2631aa0d6ee46575d14479fce2c17ccb278089255f39c88
                                                                                    • Instruction Fuzzy Hash: 2E01AEB4908304AFDB00EF69D48579EFBE5EF68358F00885EE89887345E7B5D9448B82
                                                                                    APIs
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 609257D2
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    • sqlite3_bind_double.SQLITE3 ref: 609257EA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_doublesqlite3_bind_int64sqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 1465616180-0
                                                                                    • Opcode ID: 9530f87787b8119f4c9cc68ae88dcf3bf39b5687c460dfc3dfef9c72e832448e
                                                                                    • Instruction ID: 7d90fc06d4cce0e838b429dd10c1bf3c3a361cb752c215b3ba3cb2f1ab2ab036
                                                                                    • Opcode Fuzzy Hash: 9530f87787b8119f4c9cc68ae88dcf3bf39b5687c460dfc3dfef9c72e832448e
                                                                                    • Instruction Fuzzy Hash: 3D314CB1918304DBCB08DF19E49519ABBE6EB98324F10C51EEC994B38DD378C990CB91
                                                                                    APIs
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B71E
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B73C
                                                                                    • sqlite3_step.SQLITE3 ref: 6094B74A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64$sqlite3_mutex_leavesqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 3305529457-0
                                                                                    • Opcode ID: dc92f9052f14c19b23696c87723feab2593fd922d888b89f432a916288e70c30
                                                                                    • Instruction ID: cea3564161c85327b61b62d60446574847d05a2bcfebeda4641ea5396b37aa5a
                                                                                    • Opcode Fuzzy Hash: dc92f9052f14c19b23696c87723feab2593fd922d888b89f432a916288e70c30
                                                                                    • Instruction Fuzzy Hash: D401A8B45047049FCB00DF19D9C968ABBE5FF98354F158869FC888B305D374E8548BA6
                                                                                    APIs
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B795
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 6094B7B3
                                                                                    • sqlite3_step.SQLITE3 ref: 6094B7C1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64$sqlite3_mutex_leavesqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 3305529457-0
                                                                                    • Opcode ID: aa85c24925b376cbc314ef521cc12e9f9171d3119abae0787e576649609cd9a8
                                                                                    • Instruction ID: 1e84d685e39bf1e153ba29bb425c2efe513faafee25cd0ef6e7f8ad628d1a415
                                                                                    • Opcode Fuzzy Hash: aa85c24925b376cbc314ef521cc12e9f9171d3119abae0787e576649609cd9a8
                                                                                    • Instruction Fuzzy Hash: 6B01BBB45057049FCB00DF19D58968ABBE5EF98354F15C46AFC888B305E374E854CFA6
                                                                                    APIs
                                                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6090C1EA
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6090C22F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 1477753154-0
                                                                                    • Opcode ID: 8c595cf50166d2d57a1b46d7a61a8743a20f226779b5cb212a2500e19f50b056
                                                                                    • Instruction ID: fc120f7ed3300d8301d0f99cb769197b575d5683181bd6b289e4b53452841bc5
                                                                                    • Opcode Fuzzy Hash: 8c595cf50166d2d57a1b46d7a61a8743a20f226779b5cb212a2500e19f50b056
                                                                                    • Instruction Fuzzy Hash: 6501F4715042548BDB449F2EC4C576EBBEAEF65318F048469DD419B326D374D882CBA1
                                                                                    APIs
                                                                                      • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 609255B2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 1465156292-0
                                                                                    • Opcode ID: 61f2b65abbb078f396bfa931b2809e4962fa985140118a0fa907d432528e7d54
                                                                                    • Instruction ID: 19c4c58ecb434a21204d9b38047e93a23a7f28015e8477a734fda6841bb58fe8
                                                                                    • Opcode Fuzzy Hash: 61f2b65abbb078f396bfa931b2809e4962fa985140118a0fa907d432528e7d54
                                                                                    • Instruction Fuzzy Hash: 56317AB4A082188FCB04DF69D880A8EBBF6FF99314F008559FC5897348D734D940CBA5
                                                                                    APIs
                                                                                      • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60925769
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 1465156292-0
                                                                                    • Opcode ID: f78b12b45e858c7fd8cb74f5d211d4e30abbc68d4504511404b73e1b177a8d68
                                                                                    • Instruction ID: d5dd20366bd30be5098f9e48471fbeb1ccf01997be5a2761bb4486817e6b3aba
                                                                                    • Opcode Fuzzy Hash: f78b12b45e858c7fd8cb74f5d211d4e30abbc68d4504511404b73e1b177a8d68
                                                                                    • Instruction Fuzzy Hash: 23F08171A10A28D7CB106F29EC8958EBBB9FF69254B055058ECC1A730CDB35D925C791
                                                                                    APIs
                                                                                      • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60925508
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 1465156292-0
                                                                                    • Opcode ID: 7f15987c0945e0fd4273a36fcce91cc0d916abb620506d2e7fdad6d0c82ef640
                                                                                    • Instruction ID: ad89f0bb34aa7175efe61e1ac22fb0c12735e6005c3b9edbf096fd229bca234b
                                                                                    • Opcode Fuzzy Hash: 7f15987c0945e0fd4273a36fcce91cc0d916abb620506d2e7fdad6d0c82ef640
                                                                                    • Instruction Fuzzy Hash: 5A01A475B107148BCB109F2ACC8164BBBFAEF68254F05991AEC41DB315D775ED458BC0
                                                                                    APIs
                                                                                      • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 1465156292-0
                                                                                    • Opcode ID: ebbe32869a67294cb2d54c108597a832b3743d43329dcf341f64f2493053d601
                                                                                    • Instruction ID: 4fd0dfe8dd6226820e052206e0db6187a6d8a97f2116fb4a305c2fd2856f8961
                                                                                    • Opcode Fuzzy Hash: ebbe32869a67294cb2d54c108597a832b3743d43329dcf341f64f2493053d601
                                                                                    • Instruction Fuzzy Hash: 94F08CB5A002099BCB00DF2AD88088ABBBAFF98264B05952AEC049B314D770E941CBD0
                                                                                    APIs
                                                                                      • Part of subcall function 6092535E: sqlite3_log.SQLITE3 ref: 60925406
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60925678
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_logsqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 1465156292-0
                                                                                    • Opcode ID: 20ce1548f611e36a3668a48b9975394e1a388ab84833d9cb320a678b216caf11
                                                                                    • Instruction ID: bc2fa39936d9f4ed0ba1ebf98b65e017ff83ed2bbf5e058a49948814e7f33c49
                                                                                    • Opcode Fuzzy Hash: 20ce1548f611e36a3668a48b9975394e1a388ab84833d9cb320a678b216caf11
                                                                                    • Instruction Fuzzy Hash: 59E0EC74A042089BCB04DF6AD4C194AB7F9EF58258B14D665EC458B309E231E9858BC1
                                                                                    APIs
                                                                                    • sqlite3_bind_int64.SQLITE3 ref: 60925704
                                                                                      • Part of subcall function 60925686: sqlite3_mutex_leave.SQLITE3 ref: 609256D3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64sqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 3064317574-0
                                                                                    • Opcode ID: 8bfbb127be37b3944cf6aee767a60d103abce584902525ba566a621f413e0d82
                                                                                    • Instruction ID: 7a9bf9350bb0d435b7485bd9c083abc2dab3a9c90cc7cce47300d03dda88f0d0
                                                                                    • Opcode Fuzzy Hash: 8bfbb127be37b3944cf6aee767a60d103abce584902525ba566a621f413e0d82
                                                                                    • Instruction Fuzzy Hash: FFD092B4909309AFCB00EF29C48644EBBE5AF98258F40C82DFC98C7314E274E8408F92
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fc903d30242b0235a49ca3dc9f8df4f0198bb3c17ee07b08e44db8f45d9d2100
                                                                                    • Instruction ID: 8dcd3a280e311d85a08cff7bb149483fc74061697cd2af1d422aa8a6e56622f3
                                                                                    • Opcode Fuzzy Hash: fc903d30242b0235a49ca3dc9f8df4f0198bb3c17ee07b08e44db8f45d9d2100
                                                                                    • Instruction Fuzzy Hash: 3DE0E2287142159BDB08EE6AC6C181B77ABBFD9654760846CE9078F202E776E9029640
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                                                    • Instruction ID: 29002ccca7877ead4b7e7e784383ace88c03f26ddf616943a2b43c0eb71ea2e3
                                                                                    • Opcode Fuzzy Hash: 5c5aa561fe8b7943dde2a358ba30c2c8876ef78bddd50c77f68009583e67d90a
                                                                                    • Instruction Fuzzy Hash: 36E0E2B850430DABDF00CF09D8C188A7BAAFB08364F10C119FC190B305C371E9548BA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c82c79c3d673ce5d83164ffe7b594e49b00bd73c00824d0aa5044480003c1f0d
                                                                                    • Instruction ID: a276b763828cd9d21177d39229c24ef0f5c00ef14d0f26540801fec71d9d5410
                                                                                    • Opcode Fuzzy Hash: c82c79c3d673ce5d83164ffe7b594e49b00bd73c00824d0aa5044480003c1f0d
                                                                                    • Instruction Fuzzy Hash: 29E0E2B850430DABDF00CF09D8C198A7BAAFB08264F10C119FC190B304C331E9148BE1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                                                    • Instruction ID: aa639d4c52eda77921d109c173628d401b16d57fa3137d2b917a91732d8775c8
                                                                                    • Opcode Fuzzy Hash: d3c407e99ff1326d716251d27052f3514f6d3ace0f30ccd24b81610f61b1d9b8
                                                                                    • Instruction Fuzzy Hash: D7C01265704208574B00E92DE8C154577AA9718164B108039E80B87301D975ED084291
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 83a733227118cb881a49c8c313e73996236a25ff6ef409992dae375156ab2579
                                                                                    • Instruction ID: b9da89681c28018b616aefc3abdd9d2409dd53a1bfe33812f7039069606fa4db
                                                                                    • Opcode Fuzzy Hash: 83a733227118cb881a49c8c313e73996236a25ff6ef409992dae375156ab2579
                                                                                    • Instruction Fuzzy Hash: 6DB09214310A0F829B008B29A4819277BEEAB989897558064990A8A115FA71F88286C0
                                                                                    APIs
                                                                                    • sqlite3_initialize.SQLITE3 ref: 6096C5BE
                                                                                      • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                    • sqlite3_log.SQLITE3 ref: 6096C5FC
                                                                                    • sqlite3_free.SQLITE3 ref: 6096C67E
                                                                                    • sqlite3_free.SQLITE3 ref: 6096CD71
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6096CD80
                                                                                    • sqlite3_errcode.SQLITE3 ref: 6096CD88
                                                                                    • sqlite3_close.SQLITE3 ref: 6096CD97
                                                                                    • sqlite3_create_function.SQLITE3 ref: 6096CDF8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_closesqlite3_create_functionsqlite3_errcodesqlite3_initializesqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                                                    • String ID: BINARY$NOCASE$RTRIM$porter$rtree$rtree_i32$simple
                                                                                    • API String ID: 1320758876-2501389569
                                                                                    • Opcode ID: 6bfcb0ec024900a9d9b4e92c8a495cd7f0e11888819caa106d9e2d842adf35f2
                                                                                    • Instruction ID: 66f98c4e8467cc0752991b2fada45a5d6d89a43a55ba94f1559c09c68fc79e30
                                                                                    • Opcode Fuzzy Hash: 6bfcb0ec024900a9d9b4e92c8a495cd7f0e11888819caa106d9e2d842adf35f2
                                                                                    • Instruction Fuzzy Hash: 7A024BB05183019BEB119F64C49536ABFF6BFA1348F11882DE8959F386D7B9C845CF82
                                                                                    APIs
                                                                                    • sqlite3_free.SQLITE3 ref: 609264C9
                                                                                    • sqlite3_free.SQLITE3 ref: 60926526
                                                                                    • sqlite3_free.SQLITE3 ref: 6092652E
                                                                                    • sqlite3_free.SQLITE3 ref: 60926550
                                                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                      • Part of subcall function 6090AFF5: sqlite3_free.SQLITE3 ref: 6090B09A
                                                                                    • sqlite3_free.SQLITE3 ref: 60926626
                                                                                    • sqlite3_win32_mbcs_to_utf8.SQLITE3 ref: 6092662E
                                                                                    • sqlite3_free.SQLITE3 ref: 60926638
                                                                                    • sqlite3_snprintf.SQLITE3 ref: 6092666B
                                                                                    • sqlite3_free.SQLITE3 ref: 60926673
                                                                                    • sqlite3_snprintf.SQLITE3 ref: 609266B8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_snprintf$sqlite3_mutex_entersqlite3_win32_mbcs_to_utf8
                                                                                    • String ID: \$winFullPathname1$winFullPathname2$winFullPathname3$winFullPathname4
                                                                                    • API String ID: 937752868-2111127023
                                                                                    • Opcode ID: 76700054f020c8d7fe753577c30eef17e659d67ca67044e42639e839992701d7
                                                                                    • Instruction ID: 28f04709130b2e8b140c84fcd32bad5e17fba194e1ccee1aab8ced89c5ccf9cf
                                                                                    • Opcode Fuzzy Hash: 76700054f020c8d7fe753577c30eef17e659d67ca67044e42639e839992701d7
                                                                                    • Instruction Fuzzy Hash: EA712E706183058FE700AF69D88465DBFF6AFA5748F00C82DE8999B314E778C845DF92
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcmp$sqlite3_mprintf$sqlite3_malloc$sqlite3_freesqlite3_vfs_find
                                                                                    • String ID: @$access$cache
                                                                                    • API String ID: 4158134138-1361544076
                                                                                    • Opcode ID: 19065094f7a61ae5fa0f118773a69bd69932ab9bc71fb499c0e2e31449818374
                                                                                    • Instruction ID: 35071b2ec389daa84eb338d99e29a1052eb2425681bc363379ff67fe3f9a0dd7
                                                                                    • Opcode Fuzzy Hash: 19065094f7a61ae5fa0f118773a69bd69932ab9bc71fb499c0e2e31449818374
                                                                                    • Instruction Fuzzy Hash: 27D19E75D183458BDB11CF69E58039EBBF7AFAA304F20846ED4949B349D339D882CB52
                                                                                    APIs
                                                                                    Strings
                                                                                    • PRAGMA vacuum_db.synchronous=OFF, xrefs: 609485BB
                                                                                    • SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 609486C8
                                                                                    • SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' , xrefs: 609486E8
                                                                                    • BEGIN;, xrefs: 609485DB
                                                                                    • ATTACH ':memory:' AS vacuum_db;, xrefs: 60948534
                                                                                    • SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %', xrefs: 60948708
                                                                                    • SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' , xrefs: 60948748
                                                                                    • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';, xrefs: 60948768
                                                                                    • SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0, xrefs: 60948728
                                                                                    • INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0), xrefs: 60948788
                                                                                    • ATTACH '' AS vacuum_db;, xrefs: 60948529
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_log
                                                                                    • String ID: ATTACH '' AS vacuum_db;$ATTACH ':memory:' AS vacuum_db;$BEGIN;$INSERT INTO vacuum_db.sqlite_master SELECT type, name, tbl_name, rootpage, sql FROM main.sqlite_master WHERE type='view' OR type='trigger' OR (type='table' AND rootpage=0)$PRAGMA vacuum_db.synchronous=OFF$SELECT 'CREATE INDEX vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE sql LIKE 'CREATE INDEX %' $SELECT 'CREATE TABLE vacuum_db.' || substr(sql,14) FROM sqlite_master WHERE type='table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0$SELECT 'CREATE UNIQUE INDEX vacuum_db.' || substr(sql,21) FROM sqlite_master WHERE sql LIKE 'CREATE UNIQUE INDEX %'$SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence' $SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';$SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND coalesce(rootpage,1)>0
                                                                                    • API String ID: 632333372-52344843
                                                                                    • Opcode ID: d52540ff3cd5a889f8fcb2175177c5c293f6bf3e96b3409faf11301466b535e5
                                                                                    • Instruction ID: 17dae18cb22bd420f764556e48f7e631e7f528851c991f2db59136dec61311d4
                                                                                    • Opcode Fuzzy Hash: d52540ff3cd5a889f8fcb2175177c5c293f6bf3e96b3409faf11301466b535e5
                                                                                    • Instruction Fuzzy Hash: 1202F6B0A046299BDB2ACF18C88179EB7FABF65304F1081D9E858AB355D771DE81CF41
                                                                                    APIs
                                                                                      • Part of subcall function 609296D1: sqlite3_value_bytes.SQLITE3 ref: 609296F3
                                                                                      • Part of subcall function 609296D1: sqlite3_mprintf.SQLITE3 ref: 60929708
                                                                                      • Part of subcall function 609296D1: sqlite3_free.SQLITE3 ref: 6092971B
                                                                                      • Part of subcall function 6095FFB2: sqlite3_bind_int64.SQLITE3 ref: 6095FFFA
                                                                                      • Part of subcall function 6095FFB2: sqlite3_step.SQLITE3 ref: 60960009
                                                                                      • Part of subcall function 6095FFB2: sqlite3_reset.SQLITE3 ref: 60960019
                                                                                      • Part of subcall function 6095FFB2: sqlite3_result_error_code.SQLITE3 ref: 60960043
                                                                                    • sqlite3_malloc.SQLITE3 ref: 60960384
                                                                                    • sqlite3_free.SQLITE3 ref: 609605EA
                                                                                    • sqlite3_result_error_code.SQLITE3 ref: 6096060D
                                                                                    • sqlite3_free.SQLITE3 ref: 60960618
                                                                                    • sqlite3_result_text.SQLITE3 ref: 6096063C
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_result_error_code$sqlite3_bind_int64sqlite3_mallocsqlite3_mprintfsqlite3_resetsqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                                                    • String ID: offsets
                                                                                    • API String ID: 463808202-2642679573
                                                                                    • Opcode ID: 496dcd0dbd0e24e84f3ae9a4f9495b5d667a7098f4014ef95464c797b1727b83
                                                                                    • Instruction ID: 1101d6838161b799219a4b3d5732631e197d31251dd2d8b91c34f261bd2faa79
                                                                                    • Opcode Fuzzy Hash: 496dcd0dbd0e24e84f3ae9a4f9495b5d667a7098f4014ef95464c797b1727b83
                                                                                    • Instruction Fuzzy Hash: 72C1D374A183198FDB14CF59C580B8EBBF2BFA8314F2085A9E849AB354D734D985CF52
                                                                                    APIs
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6091A3C1
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A3D6
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6091A3E4
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A416
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6091A424
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A43A
                                                                                    • sqlite3_result_text.SQLITE3 ref: 6091A5A2
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_result_text
                                                                                    • String ID:
                                                                                    • API String ID: 2903785150-0
                                                                                    • Opcode ID: 408a6008a3f19a662094ad197d730d6af4ceeedc2d56196c0f88669f9a2ea12f
                                                                                    • Instruction ID: 050d84d3da0bd462ad4a4a15df4a38950001fc66f1de33c81d7c2c3a6f7146e7
                                                                                    • Opcode Fuzzy Hash: 408a6008a3f19a662094ad197d730d6af4ceeedc2d56196c0f88669f9a2ea12f
                                                                                    • Instruction Fuzzy Hash: 8971D074E086599FCF00DFA8C88069DBBF2BF59314F1485AAE855AB304E734EC85CB91
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_freesqlite3_malloc
                                                                                    • String ID:
                                                                                    • API String ID: 423083942-0
                                                                                    • Opcode ID: 039a1925b88827ab71129b12bf0a0cfd7bb9a75e2f5fb5313a60c0869b9e4a18
                                                                                    • Instruction ID: dba10035f3c017a022ff92dc0406edc4c972eb6647695f7afdbed5011b3e14eb
                                                                                    • Opcode Fuzzy Hash: 039a1925b88827ab71129b12bf0a0cfd7bb9a75e2f5fb5313a60c0869b9e4a18
                                                                                    • Instruction Fuzzy Hash: 9112E3B4A15218CFCB18CF98D480A9EBBF6BF98304F24855AD855AB319D774EC42CF90
                                                                                    APIs
                                                                                    • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                    • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091264D
                                                                                    • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912662
                                                                                    • sqlite3_malloc.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091273E
                                                                                    • sqlite3_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912753
                                                                                    • sqlite3_os_init.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912758
                                                                                    • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 60912803
                                                                                    • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091280E
                                                                                    • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091282A
                                                                                    • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 6091283F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_freesqlite3_mallocsqlite3_mutex_freesqlite3_os_init
                                                                                    • String ID:
                                                                                    • API String ID: 3556715608-0
                                                                                    • Opcode ID: 7a5b012c4fe40a1866ea25e0c9ef8651b072e840c3be51a8f23ca71a75eb633f
                                                                                    • Instruction ID: 37d7613b282c24208f37f95ee69ae3eaf9c0527d79975c213f2f38643f7f707f
                                                                                    • Opcode Fuzzy Hash: 7a5b012c4fe40a1866ea25e0c9ef8651b072e840c3be51a8f23ca71a75eb633f
                                                                                    • Instruction Fuzzy Hash: FEA14A71A2C215CBEB009F69CC843257FE7B7A7318F10816DD415AB2A0E7B9DC95EB11
                                                                                    APIs
                                                                                    • sqlite3_malloc.SQLITE3 ref: 6095F645
                                                                                    • sqlite3_exec.SQLITE3 ref: 6095F686
                                                                                      • Part of subcall function 6094CBB8: sqlite3_log.SQLITE3 ref: 6094CBF8
                                                                                    • sqlite3_free_table.SQLITE3 ref: 6095F6A0
                                                                                    • sqlite3_mprintf.SQLITE3 ref: 6095F6C7
                                                                                      • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                                                      • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                                                    • sqlite3_free.SQLITE3 ref: 6095F6B4
                                                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                    • sqlite3_free.SQLITE3 ref: 6095F6D4
                                                                                    • sqlite3_free.SQLITE3 ref: 6095F6ED
                                                                                    • sqlite3_free_table.SQLITE3 ref: 6095F6FF
                                                                                    • sqlite3_realloc.SQLITE3 ref: 6095F71B
                                                                                    • sqlite3_free_table.SQLITE3 ref: 6095F72D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_freesqlite3_free_table$sqlite3_execsqlite3_initializesqlite3_logsqlite3_mallocsqlite3_mprintfsqlite3_mutex_entersqlite3_reallocsqlite3_vmprintf
                                                                                    • String ID:
                                                                                    • API String ID: 1866449048-0
                                                                                    • Opcode ID: 2addae8d4502475aa330d0fbe12d9077f3fed0f055932ab6dac269a256a03500
                                                                                    • Instruction ID: 9ac78cbffd0e0cf27e5d0fdbf17c3a3d034f00011a14f89e76d08e502163788c
                                                                                    • Opcode Fuzzy Hash: 2addae8d4502475aa330d0fbe12d9077f3fed0f055932ab6dac269a256a03500
                                                                                    • Instruction Fuzzy Hash: 8751F1B49467099FDB01DF69D59178EBBF6FF68318F104429E884AB300D379D894CB91
                                                                                    APIs
                                                                                    • sqlite3_finalize.SQLITE3 ref: 609407B4
                                                                                      • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940672
                                                                                      • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940696
                                                                                    • sqlite3_finalize.SQLITE3 ref: 609407C2
                                                                                      • Part of subcall function 6094064B: sqlite3_mutex_enter.SQLITE3 ref: 609406A7
                                                                                    • sqlite3_finalize.SQLITE3 ref: 609407D0
                                                                                    • sqlite3_finalize.SQLITE3 ref: 609407DE
                                                                                    • sqlite3_finalize.SQLITE3 ref: 609407EC
                                                                                    • sqlite3_finalize.SQLITE3 ref: 609407FA
                                                                                    • sqlite3_finalize.SQLITE3 ref: 60940808
                                                                                    • sqlite3_finalize.SQLITE3 ref: 60940816
                                                                                    • sqlite3_finalize.SQLITE3 ref: 60940824
                                                                                    • sqlite3_free.SQLITE3 ref: 6094082C
                                                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_finalize$sqlite3_logsqlite3_mutex_enter$sqlite3_free
                                                                                    • String ID:
                                                                                    • API String ID: 14011187-0
                                                                                    • Opcode ID: d36625bd4fa8924ea0abcbec615d2e266582c2e39b3be902bd1f9101c01d6c45
                                                                                    • Instruction ID: 14c977e837db455c9c1ce3b69ce7d4e0fb0da6313972e550a4586d0eb1b189ee
                                                                                    • Opcode Fuzzy Hash: d36625bd4fa8924ea0abcbec615d2e266582c2e39b3be902bd1f9101c01d6c45
                                                                                    • Instruction Fuzzy Hash: F7116774504B008BCB50BF78C9C965877E9AFB5308F061978EC8A8F306EB34D4918B15
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $ AND $%s USING %sINDEX %s%s$%s USING AUTOMATIC %sINDEX%.0s%s$)><$0$ANY($COVERING $SCAN$SEARCH$rowid
                                                                                    • API String ID: 0-780898
                                                                                    • Opcode ID: d1d17e5dd7c74eae3224551f6f3ab351f201226dcaab78a09df61ec6b72ac00d
                                                                                    • Instruction ID: 1b008e11d07f16b9462ef115b46fd1892196ed4c5360d6a6f9a636b6bab85f9b
                                                                                    • Opcode Fuzzy Hash: d1d17e5dd7c74eae3224551f6f3ab351f201226dcaab78a09df61ec6b72ac00d
                                                                                    • Instruction Fuzzy Hash: 46D109B0A087099FD714CF99C19079DBBF2BFA8308F10886AE495AB355D774D982CF81
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: aolf$aolf$bolb$bolc$buod$buod$laer$laer$rahc$tni$txet
                                                                                    • API String ID: 0-2604012851
                                                                                    • Opcode ID: b472df4709d2161ac4da3e6dd873a69b8789eadb7617e1432b7f17fad04b9ea6
                                                                                    • Instruction ID: a78f5df49eecf700eafad7d6eadd6707640e608d2d263d021760269e78388884
                                                                                    • Opcode Fuzzy Hash: b472df4709d2161ac4da3e6dd873a69b8789eadb7617e1432b7f17fad04b9ea6
                                                                                    • Instruction Fuzzy Hash: 2D31B171A891458ADB21891C85503EE7FBB9BE3344F28902EC8B2DB246C735CCD0C3A2
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: memcmp$sqlite3_logsqlite3_mutex_try
                                                                                    • String ID: 0$SQLite format 3
                                                                                    • API String ID: 3174206576-3388949527
                                                                                    • Opcode ID: e2a376b1a29b79c4f9f51ec04e7584e9c4e5062bfe0a82991cc629df80cc0a0f
                                                                                    • Instruction ID: d3cc03899c2fb96d27ccc41cf7ad58ff30b38a29db2c3208110d6cb2c70dce50
                                                                                    • Opcode Fuzzy Hash: e2a376b1a29b79c4f9f51ec04e7584e9c4e5062bfe0a82991cc629df80cc0a0f
                                                                                    • Instruction Fuzzy Hash: A3028BB0A082659BDB09CF68D48178ABBF7FFA5308F148269E8459B345DB74DC85CF81
                                                                                    APIs
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6095F030
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6095F03E
                                                                                    • sqlite3_stricmp.SQLITE3 ref: 6095F0B3
                                                                                    • sqlite3_free.SQLITE3 ref: 6095F180
                                                                                      • Part of subcall function 6092E279: strcmp.MSVCRT ref: 6092E2AE
                                                                                      • Part of subcall function 6092E279: sqlite3_free.SQLITE3 ref: 6092E3A8
                                                                                    • sqlite3_free.SQLITE3 ref: 6095F1BD
                                                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                    • sqlite3_result_error_code.SQLITE3 ref: 6095F34E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_value_text$sqlite3_mutex_entersqlite3_result_error_codesqlite3_stricmpstrcmp
                                                                                    • String ID: |
                                                                                    • API String ID: 1576672187-2343686810
                                                                                    • Opcode ID: 45796efa6547682f16092b9fa288c01422e20de86ab54653b6df12e990b05c38
                                                                                    • Instruction ID: c4017fd8acd983bc841f22cdb0f4132ffe50c361176833da1127552c957ad2bb
                                                                                    • Opcode Fuzzy Hash: 45796efa6547682f16092b9fa288c01422e20de86ab54653b6df12e990b05c38
                                                                                    • Instruction Fuzzy Hash: B2B189B4A08308CBDB01CF69C491B9EBBF2BF68358F148968E854AB355D734EC55CB81
                                                                                    APIs
                                                                                    • sqlite3_file_control.SQLITE3 ref: 609537BD
                                                                                    • sqlite3_free.SQLITE3 ref: 60953842
                                                                                    • sqlite3_free.SQLITE3 ref: 6095387C
                                                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                    • sqlite3_stricmp.SQLITE3 ref: 609538D4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_file_controlsqlite3_mutex_entersqlite3_stricmp
                                                                                    • String ID: 6$timeout
                                                                                    • API String ID: 2671017102-3660802998
                                                                                    • Opcode ID: 8cffcba2199636318c40f61931f0f453c1b4c4e8a0677f5b7de6569c291e0b77
                                                                                    • Instruction ID: da3e9078838fdf1f068eeacc94130b5fe058058c2a53432068b0843c8cdd1fdd
                                                                                    • Opcode Fuzzy Hash: 8cffcba2199636318c40f61931f0f453c1b4c4e8a0677f5b7de6569c291e0b77
                                                                                    • Instruction Fuzzy Hash: 6CA11270A083198BDB15CF6AC88079EBBF6BFA9304F10846DE8589B354D774D885CF41
                                                                                    APIs
                                                                                    • sqlite3_snprintf.SQLITE3 ref: 6095D450
                                                                                      • Part of subcall function 60917354: sqlite3_vsnprintf.SQLITE3 ref: 60917375
                                                                                    • sqlite3_snprintf.SQLITE3 ref: 6095D4A1
                                                                                    • sqlite3_snprintf.SQLITE3 ref: 6095D525
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_snprintf$sqlite3_vsnprintf
                                                                                    • String ID: $)><$sqlite_master$sqlite_temp_master
                                                                                    • API String ID: 652164897-1572359634
                                                                                    • Opcode ID: 7664a015b2dc01db37cf12657f922778db359f6c70a1ba93bfebbfbe3581116b
                                                                                    • Instruction ID: a98725bc65f6cff0ffebef66634980575a39ba2d787d432de3c608a01e11e389
                                                                                    • Opcode Fuzzy Hash: 7664a015b2dc01db37cf12657f922778db359f6c70a1ba93bfebbfbe3581116b
                                                                                    • Instruction Fuzzy Hash: 5991F275E05219CFCB15CF98C48169DBBF2BFA9308F14845AE859AB314DB34ED46CB81
                                                                                    APIs
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6091B06E
                                                                                    • sqlite3_result_error_toobig.SQLITE3 ref: 6091B178
                                                                                    • sqlite3_result_error_nomem.SQLITE3 ref: 6091B197
                                                                                    • sqlite3_result_text.SQLITE3 ref: 6091B5A3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_result_error_nomemsqlite3_result_error_toobigsqlite3_result_textsqlite3_value_text
                                                                                    • String ID:
                                                                                    • API String ID: 2352520524-0
                                                                                    • Opcode ID: bf61c68f4ce88464188c3b4ec21cbec410585f797eaf5b0aff599f1fc01aebfc
                                                                                    • Instruction ID: 99f21b63ad5c9672efebb0dd762c853f70c7e366ddc85f9db9da2d733c13ec0c
                                                                                    • Opcode Fuzzy Hash: bf61c68f4ce88464188c3b4ec21cbec410585f797eaf5b0aff599f1fc01aebfc
                                                                                    • Instruction Fuzzy Hash: F9E16B71E4C2199BDB208F18C89039EBBF7AB65314F1584DAE8A857351D738DCC19F82
                                                                                    APIs
                                                                                      • Part of subcall function 609296D1: sqlite3_value_bytes.SQLITE3 ref: 609296F3
                                                                                      • Part of subcall function 609296D1: sqlite3_mprintf.SQLITE3 ref: 60929708
                                                                                      • Part of subcall function 609296D1: sqlite3_free.SQLITE3 ref: 6092971B
                                                                                    • sqlite3_exec.SQLITE3 ref: 6096A4D7
                                                                                      • Part of subcall function 6094CBB8: sqlite3_log.SQLITE3 ref: 6094CBF8
                                                                                    • sqlite3_result_text.SQLITE3 ref: 6096A5D3
                                                                                      • Part of subcall function 6096A38C: sqlite3_bind_int.SQLITE3 ref: 6096A3DE
                                                                                      • Part of subcall function 6096A38C: sqlite3_step.SQLITE3 ref: 6096A435
                                                                                      • Part of subcall function 6096A38C: sqlite3_reset.SQLITE3 ref: 6096A445
                                                                                    • sqlite3_exec.SQLITE3 ref: 6096A523
                                                                                    • sqlite3_exec.SQLITE3 ref: 6096A554
                                                                                    • sqlite3_exec.SQLITE3 ref: 6096A57F
                                                                                    • sqlite3_result_error_code.SQLITE3 ref: 6096A5E1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_exec$sqlite3_bind_intsqlite3_freesqlite3_logsqlite3_mprintfsqlite3_resetsqlite3_result_error_codesqlite3_result_textsqlite3_stepsqlite3_value_bytes
                                                                                    • String ID: optimize
                                                                                    • API String ID: 3659050757-3797040228
                                                                                    • Opcode ID: c770602c58b8b739d860714e2a7cbb539b0686760bc80d510edb2603001de118
                                                                                    • Instruction ID: 653702cfcd2f061f0588c77de086fc27204f9fc351fc8b4992cba684a546c14d
                                                                                    • Opcode Fuzzy Hash: c770602c58b8b739d860714e2a7cbb539b0686760bc80d510edb2603001de118
                                                                                    • Instruction Fuzzy Hash: E831C3B11187119FE310DF24C49570FBBE6ABA1368F10C91DF9968B350E7B9D8459F82
                                                                                    APIs
                                                                                    • sqlite3_column_blob.SQLITE3 ref: 609654FB
                                                                                    • sqlite3_column_bytes.SQLITE3 ref: 60965510
                                                                                    • sqlite3_reset.SQLITE3 ref: 60965556
                                                                                    • sqlite3_reset.SQLITE3 ref: 609655B8
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                    • sqlite3_malloc.SQLITE3 ref: 60965655
                                                                                    • sqlite3_free.SQLITE3 ref: 60965714
                                                                                    • sqlite3_free.SQLITE3 ref: 6096574B
                                                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                    • sqlite3_free.SQLITE3 ref: 609657AA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_reset$sqlite3_column_blobsqlite3_column_bytessqlite3_mallocsqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 2722129401-0
                                                                                    • Opcode ID: 718344d9776843f9d3d0f11354c3fb96bdbf3732bae6ebd8df48c35682458f02
                                                                                    • Instruction ID: e3a8cc565ee031670952cbbbf81914cbe75110044a29491daaf6513bdc913a85
                                                                                    • Opcode Fuzzy Hash: 718344d9776843f9d3d0f11354c3fb96bdbf3732bae6ebd8df48c35682458f02
                                                                                    • Instruction Fuzzy Hash: BBD1D270E14219CFEB14CFA9C48469DBBF2BF68304F20856AD899AB346D774E845CF81
                                                                                    APIs
                                                                                    • sqlite3_malloc.SQLITE3 ref: 609645D9
                                                                                      • Part of subcall function 60928099: sqlite3_malloc.SQLITE3 ref: 609280ED
                                                                                    • sqlite3_free.SQLITE3 ref: 609647C5
                                                                                      • Part of subcall function 60963D35: memcmp.MSVCRT ref: 60963E74
                                                                                    • sqlite3_free.SQLITE3 ref: 6096476B
                                                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                    • sqlite3_free.SQLITE3 ref: 6096477B
                                                                                    • sqlite3_free.SQLITE3 ref: 60964783
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_malloc$memcmpsqlite3_mutex_enter
                                                                                    • String ID:
                                                                                    • API String ID: 571598680-0
                                                                                    • Opcode ID: d604abe0313f10411a0f234c71df8e29ee85eaf68e2bcebad1bf05c151ae1b53
                                                                                    • Instruction ID: 53ad94a03898eae12f4127695087571842428d6fdffc19c65fee49adcf86f1ae
                                                                                    • Opcode Fuzzy Hash: d604abe0313f10411a0f234c71df8e29ee85eaf68e2bcebad1bf05c151ae1b53
                                                                                    • Instruction Fuzzy Hash: 5E91F674E14228CFEB14CFA9D890B9EBBB6BB99304F1085AAD849A7344D734DD81CF51
                                                                                    APIs
                                                                                    • sqlite3_mprintf.SQLITE3 ref: 60929761
                                                                                      • Part of subcall function 609296AA: sqlite3_initialize.SQLITE3 ref: 609296B0
                                                                                      • Part of subcall function 609296AA: sqlite3_vmprintf.SQLITE3 ref: 609296CA
                                                                                    • sqlite3_mprintf.SQLITE3 ref: 609297C8
                                                                                    • sqlite3_mprintf.SQLITE3 ref: 6092988B
                                                                                    • sqlite3_free.SQLITE3 ref: 609298A4
                                                                                    • sqlite3_free.SQLITE3 ref: 609298AC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mprintf$sqlite3_free$sqlite3_initializesqlite3_vmprintf
                                                                                    • String ID:
                                                                                    • API String ID: 251866411-0
                                                                                    • Opcode ID: a3bf00685530be514bf65e4252527f4a7bfa11b3ac4fddf1f02e32dfe1b6d316
                                                                                    • Instruction ID: c0caaa5c89e6f65941469514643da9571fc5146b16edc1869e8ccb0497590022
                                                                                    • Opcode Fuzzy Hash: a3bf00685530be514bf65e4252527f4a7bfa11b3ac4fddf1f02e32dfe1b6d316
                                                                                    • Instruction Fuzzy Hash: 4C417970E142098FCB00DF68D48069EFBF6FFAA314F15852AE855AB344DB34D842CB81
                                                                                    APIs
                                                                                    • sqlite3_value_int.SQLITE3 ref: 6091A7A9
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A7C3
                                                                                    • sqlite3_value_blob.SQLITE3 ref: 6091A7D0
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6091A7E3
                                                                                    • sqlite3_value_int.SQLITE3 ref: 6091A842
                                                                                    • sqlite3_result_text.SQLITE3 ref: 6091A973
                                                                                    • sqlite3_result_blob.SQLITE3 ref: 6091AA08
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_value_int$sqlite3_result_blobsqlite3_result_textsqlite3_value_blobsqlite3_value_bytessqlite3_value_text
                                                                                    • String ID:
                                                                                    • API String ID: 1854132711-0
                                                                                    • Opcode ID: 784825b838f169ca3662fcccfed6716ebcc1b6a8caffef0423c1b1d1c55abeb3
                                                                                    • Instruction ID: 5a39f3de11663d91415d6d961256fd3a5a8574b0eada45011bd6777fd74d0884
                                                                                    • Opcode Fuzzy Hash: 784825b838f169ca3662fcccfed6716ebcc1b6a8caffef0423c1b1d1c55abeb3
                                                                                    • Instruction Fuzzy Hash: 6CA15C71E0862D8BDB05CFA9C88069DB7B2BF69324F148299E865A7391D734DC86CF50
                                                                                    APIs
                                                                                    • sqlite3_blob_reopen.SQLITE3 ref: 60963510
                                                                                      • Part of subcall function 60962F28: sqlite3_log.SQLITE3 ref: 60962F5D
                                                                                    • sqlite3_mprintf.SQLITE3 ref: 60963534
                                                                                    • sqlite3_blob_open.SQLITE3 ref: 6096358B
                                                                                    • sqlite3_blob_bytes.SQLITE3 ref: 609635A3
                                                                                    • sqlite3_malloc.SQLITE3 ref: 609635BB
                                                                                    • sqlite3_blob_read.SQLITE3 ref: 60963602
                                                                                    • sqlite3_free.SQLITE3 ref: 60963621
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_blob_bytessqlite3_blob_opensqlite3_blob_readsqlite3_blob_reopensqlite3_freesqlite3_logsqlite3_mallocsqlite3_mprintf
                                                                                    • String ID:
                                                                                    • API String ID: 4276469440-0
                                                                                    • Opcode ID: 81f80890dbec9a3991ff68d8cfcbb164f6b4d7f09a97d6cb6c54cb11191f3d09
                                                                                    • Instruction ID: 177081cd506585250240414a33056f89eeda992db91a315aff795e5fc91eaf1e
                                                                                    • Opcode Fuzzy Hash: 81f80890dbec9a3991ff68d8cfcbb164f6b4d7f09a97d6cb6c54cb11191f3d09
                                                                                    • Instruction Fuzzy Hash: C641E5B09087059FDB40DF29C48179EBBE6AF98354F01C87AE898DB354E734D841DB92
                                                                                    APIs
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6091A240
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6091A24E
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A25A
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6091A27C
                                                                                    Strings
                                                                                    • ESCAPE expression must be a single character, xrefs: 6091A293
                                                                                    • LIKE or GLOB pattern too complex, xrefs: 6091A267
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_value_text$sqlite3_value_bytes
                                                                                    • String ID: ESCAPE expression must be a single character$LIKE or GLOB pattern too complex
                                                                                    • API String ID: 4080917175-264706735
                                                                                    • Opcode ID: e5bda90e0e0ba1860c41bc069fb20e3a267b2c9271c0a370806f06164fd47fa4
                                                                                    • Instruction ID: 7e7232241edcba55bc41816b79a09feadaac9d75cc2fb544db44a2248cbef301
                                                                                    • Opcode Fuzzy Hash: e5bda90e0e0ba1860c41bc069fb20e3a267b2c9271c0a370806f06164fd47fa4
                                                                                    • Instruction Fuzzy Hash: A4214C74A182198BCB00DF79C88165EBBF6FF64354B108AA9E864DB344E734DCC6CB95
                                                                                    APIs
                                                                                      • Part of subcall function 6092506E: sqlite3_log.SQLITE3 ref: 609250AB
                                                                                    • sqlite3_mutex_enter.SQLITE3 ref: 609250E7
                                                                                    • sqlite3_value_text16.SQLITE3 ref: 60925100
                                                                                    • sqlite3_value_text16.SQLITE3 ref: 6092512C
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6092513E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_value_text16$sqlite3_logsqlite3_mutex_entersqlite3_mutex_leave
                                                                                    • String ID: library routine called out of sequence$out of memory
                                                                                    • API String ID: 2019783549-3029887290
                                                                                    • Opcode ID: bf8b25fefa583efc99e02b0fe9019e927645d1a19242a42ec125398c6bed8d9e
                                                                                    • Instruction ID: f6310061860eb79c45c0a7b6efb00bde58ba827c5a391e7df96a4cb3fbc4cfa9
                                                                                    • Opcode Fuzzy Hash: bf8b25fefa583efc99e02b0fe9019e927645d1a19242a42ec125398c6bed8d9e
                                                                                    • Instruction Fuzzy Hash: 81014C70A083049BDB14AF69C9C170EBBE6BF64248F0488A9EC958F30EE775D8818B51
                                                                                    APIs
                                                                                    • sqlite3_finalize.SQLITE3 ref: 609406E3
                                                                                      • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940672
                                                                                      • Part of subcall function 6094064B: sqlite3_log.SQLITE3 ref: 60940696
                                                                                    • sqlite3_free.SQLITE3 ref: 609406F7
                                                                                    • sqlite3_free.SQLITE3 ref: 60940705
                                                                                    • sqlite3_free.SQLITE3 ref: 60940713
                                                                                    • sqlite3_free.SQLITE3 ref: 6094071E
                                                                                    • sqlite3_free.SQLITE3 ref: 60940729
                                                                                    • sqlite3_free.SQLITE3 ref: 6094073C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_log$sqlite3_finalize
                                                                                    • String ID:
                                                                                    • API String ID: 1159759059-0
                                                                                    • Opcode ID: 19269ae46022e444f8470c890b78f38089a522c4155da373e534dfec766a18bc
                                                                                    • Instruction ID: 8ceab58ab7f3fb7faec85fb80e78016d1f3d655de586deaf1cb04ee1bc4e3406
                                                                                    • Opcode Fuzzy Hash: 19269ae46022e444f8470c890b78f38089a522c4155da373e534dfec766a18bc
                                                                                    • Instruction Fuzzy Hash: C801E8B45447108BDB00AF78C4C5A59BBE5EF79B18F06096DECCA8B305D734D8809B91
                                                                                    APIs
                                                                                    • sqlite3_free.SQLITE3(?), ref: 609476DD
                                                                                      • Part of subcall function 60904423: sqlite3_mutex_leave.SQLITE3(6090449D,?,?,?,60908270), ref: 60904446
                                                                                    • sqlite3_log.SQLITE3 ref: 609498F5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_freesqlite3_logsqlite3_mutex_leave
                                                                                    • String ID: List of tree roots: $d$|
                                                                                    • API String ID: 3709608969-1164703836
                                                                                    • Opcode ID: 316fa83f4dc1e403b3b617744d66ff6f9af545e53e2752a9ff9486d467efffaf
                                                                                    • Instruction ID: c91562837ba2d96ae21b52ab8334c840e7cbe23d8154f1acff92b465618a0bd4
                                                                                    • Opcode Fuzzy Hash: 316fa83f4dc1e403b3b617744d66ff6f9af545e53e2752a9ff9486d467efffaf
                                                                                    • Instruction Fuzzy Hash: 3FE10570A043698BDB22CF18C88179DFBBABF65304F1185D9E858AB251D775DE81CF81
                                                                                    APIs
                                                                                      • Part of subcall function 6095FFB2: sqlite3_bind_int64.SQLITE3 ref: 6095FFFA
                                                                                      • Part of subcall function 6095FFB2: sqlite3_step.SQLITE3 ref: 60960009
                                                                                      • Part of subcall function 6095FFB2: sqlite3_reset.SQLITE3 ref: 60960019
                                                                                      • Part of subcall function 6095FFB2: sqlite3_result_error_code.SQLITE3 ref: 60960043
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 609600BA
                                                                                    • sqlite3_column_text.SQLITE3 ref: 609600EF
                                                                                    • sqlite3_free.SQLITE3 ref: 6096029A
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_bind_int64sqlite3_column_int64sqlite3_column_textsqlite3_freesqlite3_resetsqlite3_result_error_codesqlite3_step
                                                                                    • String ID: e
                                                                                    • API String ID: 786425071-4024072794
                                                                                    • Opcode ID: 373422d03c3c71c2ddc35291c61dfb2213fd8f263c0b9a30c36f02d650250dc2
                                                                                    • Instruction ID: e80500568aa73e744b5c90812a7938b6c4ac38b40afb48beb036dafaf3e7d002
                                                                                    • Opcode Fuzzy Hash: 373422d03c3c71c2ddc35291c61dfb2213fd8f263c0b9a30c36f02d650250dc2
                                                                                    • Instruction Fuzzy Hash: 6291E270A18609CFDB04CF99C494B9EBBF2BF98314F108529E869AB354D774E885CF91
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_exec
                                                                                    • String ID: sqlite_master$sqlite_temp_master$|
                                                                                    • API String ID: 2141490097-2247242311
                                                                                    • Opcode ID: 0e32379bf9c90bcee3e658b343db186d73978ee403121efd96d42beb4ff38922
                                                                                    • Instruction ID: 9143400cfb6dc20a8edc2ca7c04099347fc9d468871a1d2187ae3123f936d49a
                                                                                    • Opcode Fuzzy Hash: 0e32379bf9c90bcee3e658b343db186d73978ee403121efd96d42beb4ff38922
                                                                                    • Instruction Fuzzy Hash: C551B6B09083289BDB26CF18C885799BBFABF59304F108599E498A7351D775DA84CF41
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$memcmpsqlite3_realloc
                                                                                    • String ID:
                                                                                    • API String ID: 3422960571-0
                                                                                    • Opcode ID: 50eda45380483794e32bdd730fc6b6b580c41d30328003452ec2c22d7d846426
                                                                                    • Instruction ID: 3b390e38dde49c5924589a602beaf2ee173d98914be71c714148da16d267e2cf
                                                                                    • Opcode Fuzzy Hash: 50eda45380483794e32bdd730fc6b6b580c41d30328003452ec2c22d7d846426
                                                                                    • Instruction Fuzzy Hash: 42B1D0B4E142189BEB05CFA9C5807DDBBF6BFA8304F148429E858A7344D374E946CF91
                                                                                    APIs
                                                                                      • Part of subcall function 6090A0D5: sqlite3_free.SQLITE3 ref: 6090A118
                                                                                    • sqlite3_malloc.SQLITE3 ref: 6094B1D1
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6094B24C
                                                                                    • sqlite3_malloc.SQLITE3 ref: 6094B272
                                                                                    • sqlite3_value_blob.SQLITE3 ref: 6094B298
                                                                                    • sqlite3_free.SQLITE3 ref: 6094B2C8
                                                                                      • Part of subcall function 6094A894: sqlite3_bind_int64.SQLITE3 ref: 6094A8C0
                                                                                      • Part of subcall function 6094A894: sqlite3_step.SQLITE3 ref: 6094A8CE
                                                                                      • Part of subcall function 6094A894: sqlite3_column_int64.SQLITE3 ref: 6094A8E9
                                                                                      • Part of subcall function 6094A894: sqlite3_reset.SQLITE3 ref: 6094A90F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_freesqlite3_malloc$sqlite3_bind_int64sqlite3_column_int64sqlite3_resetsqlite3_stepsqlite3_value_blobsqlite3_value_bytes
                                                                                    • String ID:
                                                                                    • API String ID: 683514883-0
                                                                                    • Opcode ID: 3036fcfce1ee653ed62d56f61367963e4d2afc4bfe1ca560103df060be3b8356
                                                                                    • Instruction ID: 83940ce9cf0a2bab7a741171fc95cc3a005d2848f59039768723a80715f2adcb
                                                                                    • Opcode Fuzzy Hash: 3036fcfce1ee653ed62d56f61367963e4d2afc4bfe1ca560103df060be3b8356
                                                                                    • Instruction Fuzzy Hash: E19133B1A052099FCB04CFA9D490B9EBBF6FF68314F108569E855AB341DB34ED81CB91
                                                                                    APIs
                                                                                    • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A200
                                                                                    • sqlite3_mutex_leave.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A391
                                                                                    • sqlite3_mutex_free.SQLITE3(?,?,?,?,?,?,?,?,6093A8DF), ref: 6093A3A3
                                                                                    • sqlite3_free.SQLITE3 ref: 6093A3BA
                                                                                    • sqlite3_free.SQLITE3 ref: 6093A3C2
                                                                                      • Part of subcall function 6093A0C5: sqlite3_mutex_enter.SQLITE3 ref: 6093A114
                                                                                      • Part of subcall function 6093A0C5: sqlite3_mutex_free.SQLITE3 ref: 6093A152
                                                                                      • Part of subcall function 6093A0C5: sqlite3_mutex_leave.SQLITE3 ref: 6093A162
                                                                                      • Part of subcall function 6093A0C5: sqlite3_free.SQLITE3 ref: 6093A1A4
                                                                                      • Part of subcall function 6093A0C5: sqlite3_free.SQLITE3 ref: 6093A1C3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_mutex_leave$sqlite3_mutex_free$sqlite3_mutex_enter
                                                                                    • String ID:
                                                                                    • API String ID: 1903298374-0
                                                                                    • Opcode ID: 8530df85f137a660efabd51ca86f4821d2fdcc6d7a3fd2cfb4f5547b241dda56
                                                                                    • Instruction ID: f6c450fbbadf2e04ab128defb7df19fdb2a161b4e6cf4e71623f80625393026f
                                                                                    • Opcode Fuzzy Hash: 8530df85f137a660efabd51ca86f4821d2fdcc6d7a3fd2cfb4f5547b241dda56
                                                                                    • Instruction Fuzzy Hash: EB513870A047218BDB58DF69C8C074AB7A6BF65318F05896CECA69B305D735EC41CF91
                                                                                    APIs
                                                                                      • Part of subcall function 60904396: sqlite3_mutex_try.SQLITE3(?,?,?,60908235), ref: 609043B8
                                                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6093A114
                                                                                    • sqlite3_mutex_free.SQLITE3 ref: 6093A152
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6093A162
                                                                                    • sqlite3_free.SQLITE3 ref: 6093A1A4
                                                                                    • sqlite3_free.SQLITE3 ref: 6093A1C3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_mutex_entersqlite3_mutex_freesqlite3_mutex_leavesqlite3_mutex_try
                                                                                    • String ID:
                                                                                    • API String ID: 1894464702-0
                                                                                    • Opcode ID: 7188b9a67afd66d207271078c150a83da37f36a2752b1b5804700c826a798ba9
                                                                                    • Instruction ID: 8ebadd1dc7ee404a0f141fd21885e91e0aa1156a5a6df10951b92a0b718128ce
                                                                                    • Opcode Fuzzy Hash: 7188b9a67afd66d207271078c150a83da37f36a2752b1b5804700c826a798ba9
                                                                                    • Instruction Fuzzy Hash: CF313C70B086118BDB18DF79C8C1A1A7BFBBFB2704F148468E8418B219EB35DC419F91
                                                                                    APIs
                                                                                      • Part of subcall function 60925326: sqlite3_log.SQLITE3 ref: 60925352
                                                                                    • sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,609254CC), ref: 6092538E
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 609253C4
                                                                                    • sqlite3_log.SQLITE3 ref: 609253E2
                                                                                    • sqlite3_log.SQLITE3 ref: 60925406
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60925443
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_log$sqlite3_mutex_leave$sqlite3_mutex_enter
                                                                                    • String ID:
                                                                                    • API String ID: 3336957480-0
                                                                                    • Opcode ID: 1198911827aa14b9fab328e6e7c73bc961b2278be0ca20fe6461460b1b30ceeb
                                                                                    • Instruction ID: a100dd02d465b32589d57b5b9efe4db3cd483c3b5de54de748c9b161d5d001e2
                                                                                    • Opcode Fuzzy Hash: 1198911827aa14b9fab328e6e7c73bc961b2278be0ca20fe6461460b1b30ceeb
                                                                                    • Instruction Fuzzy Hash: D3315A70228704DBDB00EF28D49575ABBE6AFA1358F00886DE9948F36DD778C885DB02
                                                                                    APIs
                                                                                    • sqlite3_result_blob.SQLITE3 ref: 609613D0
                                                                                    • sqlite3_column_int.SQLITE3 ref: 6096143A
                                                                                    • sqlite3_data_count.SQLITE3 ref: 60961465
                                                                                    • sqlite3_column_value.SQLITE3 ref: 60961476
                                                                                    • sqlite3_result_value.SQLITE3 ref: 60961482
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_column_intsqlite3_column_valuesqlite3_data_countsqlite3_result_blobsqlite3_result_value
                                                                                    • String ID:
                                                                                    • API String ID: 3091402450-0
                                                                                    • Opcode ID: 15f5c91e7d752206cb5be57281081ebbda5684d1dfb7c3b21a78c03d1c189b87
                                                                                    • Instruction ID: 8b12398a3b1f37ca0d2e1a8d549e1f0529ecbd38da511dd0edd3444da8e5cc4d
                                                                                    • Opcode Fuzzy Hash: 15f5c91e7d752206cb5be57281081ebbda5684d1dfb7c3b21a78c03d1c189b87
                                                                                    • Instruction Fuzzy Hash: 72314DB19082058FDB00DF29C48064EB7F6FF65354F19856AE8999B361EB34E886CF81
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                    • String ID:
                                                                                    • API String ID: 251237202-0
                                                                                    • Opcode ID: ee0aefbaff40cad113deb2524f723b57adfc4224f15c8691f87345bc20e459c1
                                                                                    • Instruction ID: 8e14962182cb4ba31828fc05f1b37fa5954e33605a362b2e641de35f96add61e
                                                                                    • Opcode Fuzzy Hash: ee0aefbaff40cad113deb2524f723b57adfc4224f15c8691f87345bc20e459c1
                                                                                    • Instruction Fuzzy Hash: 022137B46087158BC709AF68C48570ABBF6FFA5318F10895DEC958B345DB74E940CB82
                                                                                    APIs
                                                                                    • sqlite3_aggregate_context.SQLITE3 ref: 6091A31E
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6091A349
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A356
                                                                                    • sqlite3_value_text.SQLITE3 ref: 6091A37B
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A387
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_value_bytessqlite3_value_text$sqlite3_aggregate_context
                                                                                    • String ID:
                                                                                    • API String ID: 4225432645-0
                                                                                    • Opcode ID: e7dd5294350f58c57afd4f2551108a775ab72f2657aaaf635efeb712e258985e
                                                                                    • Instruction ID: 24a20a1669ecabf1c8c9e0f75de4e20f6480f0c3e20d7f4799920e66bb4c3c2a
                                                                                    • Opcode Fuzzy Hash: e7dd5294350f58c57afd4f2551108a775ab72f2657aaaf635efeb712e258985e
                                                                                    • Instruction Fuzzy Hash: 3F21CF71B086588FDB009F29C48075E7BE7AFA4254F0484A8E894CF305EB34DC86CB91
                                                                                    APIs
                                                                                    • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 6090359D
                                                                                    • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 609035E0
                                                                                    • sqlite3_mutex_enter.SQLITE3(?,-00000200,?), ref: 609035F9
                                                                                    • sqlite3_mutex_leave.SQLITE3(?,-00000200,?), ref: 60903614
                                                                                    • sqlite3_free.SQLITE3(?,-00000200,?), ref: 6090361C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave$sqlite3_free
                                                                                    • String ID:
                                                                                    • API String ID: 251237202-0
                                                                                    • Opcode ID: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                                                    • Instruction ID: 98a7ce7f1ce2ff6a0e5ca4ca87ec4bf20a5c319c62b2fc6798152503390b0136
                                                                                    • Opcode Fuzzy Hash: d176fa110bd2286076a254f1a84b89a7a2b75649dc4a807f2bdee778eef171d4
                                                                                    • Instruction Fuzzy Hash: B211FE725186218BCB00EF7DC8C16197FE7FB66358F01491DE866D7362D73AD480AB42
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_log
                                                                                    • String ID: ($string or blob too big$|
                                                                                    • API String ID: 632333372-2398534278
                                                                                    • Opcode ID: 03236f3895d5fd10e60d1ff1eefb6ed02231b27a1c47450c0fb49d2dd58edd91
                                                                                    • Instruction ID: 3c3a64a58f66130c0c9aec06ea77be0954bd7b4098f3428da06b6372deec6608
                                                                                    • Opcode Fuzzy Hash: 03236f3895d5fd10e60d1ff1eefb6ed02231b27a1c47450c0fb49d2dd58edd91
                                                                                    • Instruction Fuzzy Hash: 5DC10CB5A043288FCB66CF28C981789B7BABB59304F1085D9E958A7345C775EF81CF40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_stricmp
                                                                                    • String ID: BINARY
                                                                                    • API String ID: 912767213-907554435
                                                                                    • Opcode ID: dd54eeba7b99beb4c129e1ce0ebb3c97c4d31291de79a9977aa1c0a9ff3222ee
                                                                                    • Instruction ID: 142a1e9d4f1e8552d2c1f4074703eb5ae9f1e70d76b7ded3e689f9c37387bea1
                                                                                    • Opcode Fuzzy Hash: dd54eeba7b99beb4c129e1ce0ebb3c97c4d31291de79a9977aa1c0a9ff3222ee
                                                                                    • Instruction Fuzzy Hash: 11512AB8A142159FCF05CF68D580A9EBBFBBFA9314F208569D855AB318D335EC41CB90
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$Protect$Query
                                                                                    • String ID: @
                                                                                    • API String ID: 3618607426-2766056989
                                                                                    • Opcode ID: a11a59528d98c4ff7ad69dfbc7d520f68a8f714e9ef4c31244658d91e7757f1c
                                                                                    • Instruction ID: 11fd3fd6c91f2e29dbdaed7331fdf7a08ef8f1da01c53322037319a40d79a89e
                                                                                    • Opcode Fuzzy Hash: a11a59528d98c4ff7ad69dfbc7d520f68a8f714e9ef4c31244658d91e7757f1c
                                                                                    • Instruction Fuzzy Hash: 003141B5E15208AFEB14DFA9D48158EFFF5EF99254F10852AE868E3310E371D940CB52
                                                                                    APIs
                                                                                    • sqlite3_malloc.SQLITE3 ref: 60928353
                                                                                      • Part of subcall function 60916FBA: sqlite3_initialize.SQLITE3(60912743,?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5), ref: 60916FC4
                                                                                    • sqlite3_realloc.SQLITE3 ref: 609283A0
                                                                                    • sqlite3_free.SQLITE3 ref: 609283B6
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_freesqlite3_initializesqlite3_mallocsqlite3_realloc
                                                                                    • String ID: d
                                                                                    • API String ID: 211589378-2564639436
                                                                                    • Opcode ID: 4c34ce46e3d0a3d1d3def0d8ad382c8948c40f702370fc4fcdce263753dde11a
                                                                                    • Instruction ID: 0830c2115c9ea807631a831f7f1165b0ee40d8a8a94356aa67113494a68d5982
                                                                                    • Opcode Fuzzy Hash: 4c34ce46e3d0a3d1d3def0d8ad382c8948c40f702370fc4fcdce263753dde11a
                                                                                    • Instruction Fuzzy Hash: 222137B0A04205CFDB14DF59D4C078ABBF6FF69314F158469D8889B309E3B8E841CBA1
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: _Jv_RegisterClasses$libgcj-11.dll
                                                                                    • API String ID: 1646373207-2713375476
                                                                                    • Opcode ID: 84d528d321f1eea6d8a1b68cb749bb1a2441192a5c5952381cf667fabd413772
                                                                                    • Instruction ID: e6822cb61b404b68644b44a252d8259deade1a358cfa59fcc717d95409d4d83a
                                                                                    • Opcode Fuzzy Hash: 84d528d321f1eea6d8a1b68cb749bb1a2441192a5c5952381cf667fabd413772
                                                                                    • Instruction Fuzzy Hash: 0DE04F7062D30586FB443F794D923297AEB5F72549F00081CD9929B240EBB4D440D753
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: .$:$:$;$;
                                                                                    • API String ID: 0-3979609778
                                                                                    • Opcode ID: 50b9d7b53ff024c5b5e5e467dd09a5a86a30f3212454febefa11a70b635a06cf
                                                                                    • Instruction ID: 88cbeff3cb36a4107b9ab761e04ae617a78179eaf1b2646578849985a96e8386
                                                                                    • Opcode Fuzzy Hash: 50b9d7b53ff024c5b5e5e467dd09a5a86a30f3212454febefa11a70b635a06cf
                                                                                    • Instruction Fuzzy Hash: 9D519DB1A083419ED701CF15C58438ABFF6FB55348F24891DD8959B291E3B9CA89CFD2
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free
                                                                                    • String ID:
                                                                                    • API String ID: 2313487548-0
                                                                                    • Opcode ID: 17c4197e66eccf8e4e539c70c01e6b2d08fb8491bcf73b2b2b780fd64eb57762
                                                                                    • Instruction ID: 4e09bb13dd5a3c3c1d339de95b14bc5918580ae4e3dbdcf066e72e084d482625
                                                                                    • Opcode Fuzzy Hash: 17c4197e66eccf8e4e539c70c01e6b2d08fb8491bcf73b2b2b780fd64eb57762
                                                                                    • Instruction Fuzzy Hash: 15E14674928209EFDB04CF94D184B9EBBB2FF69304F208558D8956B259D774EC86CF81
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: sqlite_master$sqlite_sequence$sqlite_temp_master
                                                                                    • API String ID: 0-1177837799
                                                                                    • Opcode ID: b45b6970ebe54efa46efcb65f0e1138f7cff2b55d537d73117a3441f01693427
                                                                                    • Instruction ID: e5240d50caebec33bd4ce83d4b9fb982fe545a794019e3d400788b6e3ec19482
                                                                                    • Opcode Fuzzy Hash: b45b6970ebe54efa46efcb65f0e1138f7cff2b55d537d73117a3441f01693427
                                                                                    • Instruction Fuzzy Hash: F7C13974B062089BDB05DF68D49179EBBF3AFA8308F14C42DE8899B345DB39D841CB41
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_leave$sqlite3_logsqlite3_mutex_enter
                                                                                    • String ID:
                                                                                    • API String ID: 4249760608-0
                                                                                    • Opcode ID: 55775a197f9aa81981a6c1824e65e5643dd82e92c35c8cbf90f4756fe2761598
                                                                                    • Instruction ID: 2374180173898b37ca3bb3ba1fa7e33799c7e45bceefb220d1965ad168ba1add
                                                                                    • Opcode Fuzzy Hash: 55775a197f9aa81981a6c1824e65e5643dd82e92c35c8cbf90f4756fe2761598
                                                                                    • Instruction Fuzzy Hash: 7F412970A083048BE701DF6AC495B8ABBF6FFA5308F04C46DE8598B355D779D849CB91
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_freesqlite3_mallocsqlite3_value_bytessqlite3_value_text
                                                                                    • String ID:
                                                                                    • API String ID: 1648232842-0
                                                                                    • Opcode ID: 6f401334500cf3ce8937f97dce09bc9131fc1f686c7391f4db805f1c2cabf22c
                                                                                    • Instruction ID: a01add595a6c287de5924383f0ed77e5cc34082cd65fcd393cbe5beac3228527
                                                                                    • Opcode Fuzzy Hash: 6f401334500cf3ce8937f97dce09bc9131fc1f686c7391f4db805f1c2cabf22c
                                                                                    • Instruction Fuzzy Hash: 4531C0B4A042058FDB04DF29C094B5ABBE2FF98354F1484A9EC498F349D779E846CBA0
                                                                                    APIs
                                                                                    • sqlite3_step.SQLITE3 ref: 609614AB
                                                                                    • sqlite3_reset.SQLITE3 ref: 609614BF
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_enter.SQLITE3 ref: 60941C58
                                                                                      • Part of subcall function 60941C40: sqlite3_mutex_leave.SQLITE3 ref: 60941CBE
                                                                                    • sqlite3_column_int64.SQLITE3 ref: 609614D4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_column_int64sqlite3_mutex_entersqlite3_mutex_leavesqlite3_resetsqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 3429445273-0
                                                                                    • Opcode ID: 44b7ea0f60ccad0bdb665534712f35195a3185c30aa33eaed9220a178cd48643
                                                                                    • Instruction ID: 62863439de2fabb71fd3664abc4fbfc11ff04353a6e6e3e42574d1c19fb7889d
                                                                                    • Opcode Fuzzy Hash: 44b7ea0f60ccad0bdb665534712f35195a3185c30aa33eaed9220a178cd48643
                                                                                    • Instruction Fuzzy Hash: AE316470A183408BEF15CF69C1C5749FBA6AFA7348F188599DC864F30AD375D884C752
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_snprintf$sqlite3_stricmpsqlite3_value_text
                                                                                    • String ID:
                                                                                    • API String ID: 1035992805-0
                                                                                    • Opcode ID: 213593095aed0ecc64844f89ed1f3878beaaf7633e295caa013ed5846923251b
                                                                                    • Instruction ID: 84d28b158f1a11e063f70be148de9c7b2eff514b3bcf7808f17aa895500be78a
                                                                                    • Opcode Fuzzy Hash: 213593095aed0ecc64844f89ed1f3878beaaf7633e295caa013ed5846923251b
                                                                                    • Instruction Fuzzy Hash: 8C3178B0A08324DFEB24CF28C481B4ABBF6FBA5318F04C499E4888B251C775D885DF42
                                                                                    APIs
                                                                                    • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B22B), ref: 609034D8
                                                                                    • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B22B), ref: 60903521
                                                                                    • sqlite3_mutex_enter.SQLITE3(-00000200,?,?,6090B22B), ref: 6090354A
                                                                                    • sqlite3_mutex_leave.SQLITE3(-00000200,?,?,6090B22B), ref: 60903563
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 1477753154-0
                                                                                    • Opcode ID: cc0b0c4414a91b2c8747a1fff16426ed14613a144e31e5ae299e51467139190c
                                                                                    • Instruction ID: 848dca46e936c6e01d33e08870ae11aa620bd8b24bdb606da7ea596206f2e213
                                                                                    • Opcode Fuzzy Hash: cc0b0c4414a91b2c8747a1fff16426ed14613a144e31e5ae299e51467139190c
                                                                                    • Instruction Fuzzy Hash: 44111F726186218FDB00EF7DC8817597FEAFB66308F00842DE865E7362E779D8819741
                                                                                    APIs
                                                                                    • sqlite3_initialize.SQLITE3 ref: 6092A450
                                                                                      • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6092A466
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6092A47F
                                                                                    • sqlite3_memory_used.SQLITE3 ref: 6092A4BA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 2673540737-0
                                                                                    • Opcode ID: 58333c90df1895ca2798dafcbab41657529afc007f85020e925d8580cfdcdfcb
                                                                                    • Instruction ID: c4988029ba64cfb2248a7cf0c790324acf4c13eb0f9cd3f15fdedc175ef3c91a
                                                                                    • Opcode Fuzzy Hash: 58333c90df1895ca2798dafcbab41657529afc007f85020e925d8580cfdcdfcb
                                                                                    • Instruction Fuzzy Hash: F9019276E143148BCB00EF79D88561ABFE7FBA5324F008528EC9497364E735DC408B81
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_value_text$sqlite3_freesqlite3_load_extension
                                                                                    • String ID:
                                                                                    • API String ID: 3526213481-0
                                                                                    • Opcode ID: e69664dddad2286ff6ed0cb1f1c7a121e5262b7aa8061cf10291ac83704fea4b
                                                                                    • Instruction ID: 98199466554994e62e20ad809be6129e3c08b78dd6d8c38fc18f61524e73aad2
                                                                                    • Opcode Fuzzy Hash: e69664dddad2286ff6ed0cb1f1c7a121e5262b7aa8061cf10291ac83704fea4b
                                                                                    • Instruction Fuzzy Hash: 4101E9B5A043059BCB00EF69D485AAFBBF5EF68654F10C529EC9497304E774D841CF91
                                                                                    APIs
                                                                                    • sqlite3_prepare.SQLITE3 ref: 60969166
                                                                                    • sqlite3_errmsg.SQLITE3 ref: 60969172
                                                                                      • Part of subcall function 609258A8: sqlite3_log.SQLITE3 ref: 609258E5
                                                                                    • sqlite3_errcode.SQLITE3 ref: 6096918A
                                                                                      • Part of subcall function 609251AA: sqlite3_log.SQLITE3 ref: 609251E8
                                                                                    • sqlite3_step.SQLITE3 ref: 60969197
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_log$sqlite3_errcodesqlite3_errmsgsqlite3_preparesqlite3_step
                                                                                    • String ID:
                                                                                    • API String ID: 2877408194-0
                                                                                    • Opcode ID: 06185e76a961c89383dca1620ea17d5683e825aa4cba78efc797247d66345ea8
                                                                                    • Instruction ID: d4ebd4c9a05a553e526e78eaaf80584f3afcfe73b3175c4c6dada352db343273
                                                                                    • Opcode Fuzzy Hash: 06185e76a961c89383dca1620ea17d5683e825aa4cba78efc797247d66345ea8
                                                                                    • Instruction Fuzzy Hash: 9F0186B091C3059BE700EF29C88525DFBE9EFA5314F11892DA89987384E734C940CB86
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_freesqlite3_mprintfsqlite3_value_blobsqlite3_value_bytes
                                                                                    • String ID:
                                                                                    • API String ID: 1163609955-0
                                                                                    • Opcode ID: c446836a4840d302dbdc97fcf3f25a19881b43244be54ce00609cbc101420811
                                                                                    • Instruction ID: 8e0d1a1b7fe9adeaf330fda5a565ce202833de3a42fcd494fa905fee92021967
                                                                                    • Opcode Fuzzy Hash: c446836a4840d302dbdc97fcf3f25a19881b43244be54ce00609cbc101420811
                                                                                    • Instruction Fuzzy Hash: F6F0C8716282145FC3106F3994816697BE6DFA6758F0144A9F584CB314DB75CC82C742
                                                                                    APIs
                                                                                    • sqlite3_prepare_v2.SQLITE3 ref: 609615BA
                                                                                    • sqlite3_step.SQLITE3 ref: 609615C9
                                                                                    • sqlite3_column_int.SQLITE3 ref: 609615E1
                                                                                      • Part of subcall function 6091D4F4: sqlite3_value_int.SQLITE3 ref: 6091D50C
                                                                                    • sqlite3_finalize.SQLITE3 ref: 609615EE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_column_intsqlite3_finalizesqlite3_prepare_v2sqlite3_stepsqlite3_value_int
                                                                                    • String ID:
                                                                                    • API String ID: 4265739436-0
                                                                                    • Opcode ID: edb1a347b7ee41d63e69a54b369763b34702b79c0c254a7699785c0090147395
                                                                                    • Instruction ID: 970f7a8085286b868af170b9ae73916577c28f03d50975cfa6e3c5bd991c66ad
                                                                                    • Opcode Fuzzy Hash: edb1a347b7ee41d63e69a54b369763b34702b79c0c254a7699785c0090147395
                                                                                    • Instruction Fuzzy Hash: BE01E4B0D083049BEB10EF69C58575EFBF9EFA5314F00896DE8A997380E775D9408B82
                                                                                    APIs
                                                                                    • sqlite3_initialize.SQLITE3 ref: 6092A638
                                                                                      • Part of subcall function 60912453: sqlite3_mutex_enter.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,609129E5,?), ref: 609124D1
                                                                                    • sqlite3_mutex_enter.SQLITE3 ref: 6092A64F
                                                                                    • strcmp.MSVCRT ref: 6092A66A
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6092A67D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_enter$sqlite3_initializesqlite3_mutex_leavestrcmp
                                                                                    • String ID:
                                                                                    • API String ID: 1894734062-0
                                                                                    • Opcode ID: 1480f87154849f1cdf239baa72c9ff1b5e3c835899009c68b4affe8256d9fce5
                                                                                    • Instruction ID: 0dacd04717b96a229033e5bf385d74358d6efc238696297f04088f4a0acd15ee
                                                                                    • Opcode Fuzzy Hash: 1480f87154849f1cdf239baa72c9ff1b5e3c835899009c68b4affe8256d9fce5
                                                                                    • Instruction Fuzzy Hash: EBF0B4726243044BC7006F799CC164A7FAEEEB1298B05802CEC548B319EB35DC0297A1
                                                                                    APIs
                                                                                    • sqlite3_mutex_enter.SQLITE3 ref: 609084E9
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 60908518
                                                                                    • sqlite3_mutex_enter.SQLITE3 ref: 60908528
                                                                                    • sqlite3_mutex_leave.SQLITE3 ref: 6090855B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_mutex_entersqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 1477753154-0
                                                                                    • Opcode ID: dbb0a767127359d75753d9f151f7b9e03affe710ab86404e29d94d971225fba8
                                                                                    • Instruction ID: c41a4d3f3efa942db11cbd34a9101edfe28f26dd6f673ba1da0d5803e4a0adbd
                                                                                    • Opcode Fuzzy Hash: dbb0a767127359d75753d9f151f7b9e03affe710ab86404e29d94d971225fba8
                                                                                    • Instruction Fuzzy Hash: FD01A4B05093048BDB40AF25C5D97CABBA5EF15718F0884BDEC894F34AD7B9D5448BA1
                                                                                    APIs
                                                                                    • sqlite3_free.SQLITE3 ref: 609408BE
                                                                                    • sqlite3_blob_close.SQLITE3 ref: 609408C9
                                                                                      • Part of subcall function 60940849: sqlite3_mutex_enter.SQLITE3 ref: 60940864
                                                                                      • Part of subcall function 60940849: sqlite3_finalize.SQLITE3 ref: 6094086F
                                                                                      • Part of subcall function 60940849: sqlite3_mutex_leave.SQLITE3 ref: 60940885
                                                                                    • sqlite3_free.SQLITE3 ref: 609408AD
                                                                                      • Part of subcall function 60901C61: sqlite3_mutex_enter.SQLITE3 ref: 60901C80
                                                                                    • sqlite3_free.SQLITE3 ref: 609408D1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_free$sqlite3_mutex_enter$sqlite3_blob_closesqlite3_finalizesqlite3_mutex_leave
                                                                                    • String ID:
                                                                                    • API String ID: 3376080156-0
                                                                                    • Opcode ID: 62bba8bded67edb3e7ec5b4190a567f2186f1725189168df9a038347470dbc26
                                                                                    • Instruction ID: d915195a03e04bddfc3f3f5b3271b7f2e0ed873b55f11ac5d14163ef78522696
                                                                                    • Opcode Fuzzy Hash: 62bba8bded67edb3e7ec5b4190a567f2186f1725189168df9a038347470dbc26
                                                                                    • Instruction Fuzzy Hash: F5E039B09087008FDB10AF79C5C57057BE9AB74318F4618ACE8C28B346E735D8C0CB92
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_log
                                                                                    • String ID: into$out of
                                                                                    • API String ID: 632333372-1114767565
                                                                                    • Opcode ID: 05e60a680804dc8d75cc30d301a58b6784d3cbcabfb13c7dcba40214300a3b29
                                                                                    • Instruction ID: de20b162988cb891a2f8fbcf22309076e3e21d241eadb06c465d82de9f0e8d92
                                                                                    • Opcode Fuzzy Hash: 05e60a680804dc8d75cc30d301a58b6784d3cbcabfb13c7dcba40214300a3b29
                                                                                    • Instruction Fuzzy Hash: 91910170A043149BDB26CF28C88175EBBBABF65308F0481E9E858AB355D7B5DE85CF41
                                                                                    APIs
                                                                                      • Part of subcall function 60918408: sqlite3_value_text.SQLITE3 ref: 60918426
                                                                                    • sqlite3_free.SQLITE3 ref: 609193A3
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_freesqlite3_value_text
                                                                                    • String ID: (NULL)$NULL
                                                                                    • API String ID: 2175239460-873412390
                                                                                    • Opcode ID: 2d639d8f8789be8f4f2115c7e339461789bfa1512606a4b94e85873a15b94a2d
                                                                                    • Instruction ID: 63658e955800b40111a930d2026d12727b3b294c4be858d68b3f7c51d7abf176
                                                                                    • Opcode Fuzzy Hash: 2d639d8f8789be8f4f2115c7e339461789bfa1512606a4b94e85873a15b94a2d
                                                                                    • Instruction Fuzzy Hash: E3514B31F0825A8EEB258A68C89479DBBB6BF66304F1441E9C4A9AB241D7309DC6CF01
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_log
                                                                                    • String ID: -- $d
                                                                                    • API String ID: 632333372-777087308
                                                                                    • Opcode ID: 2197877c990d2cc598be623123ad695ba2ed3a88a0fc98749b4c643aad0a3996
                                                                                    • Instruction ID: d45f625f7ed72e8bd0cbe86fb5af212c953cff4c7e5ffbb26f6c4a79540968e1
                                                                                    • Opcode Fuzzy Hash: 2197877c990d2cc598be623123ad695ba2ed3a88a0fc98749b4c643aad0a3996
                                                                                    • Instruction Fuzzy Hash: FB51F674A043689BDB26CF28C980789BBFABF55304F1481D9E89CAB341C7759E85CF40
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_log
                                                                                    • String ID: string or blob too big$|
                                                                                    • API String ID: 632333372-330586046
                                                                                    • Opcode ID: b6301cf988e6664baaa8b4960c9a349f418ad1f33ca54faa928bbeacb0d503e6
                                                                                    • Instruction ID: 65a9847582dc10a4f4f17f1c4fc8d82f10366072c52f03016cacc5a11d353e3e
                                                                                    • Opcode Fuzzy Hash: b6301cf988e6664baaa8b4960c9a349f418ad1f33ca54faa928bbeacb0d503e6
                                                                                    • Instruction Fuzzy Hash: 4D51B9749083689BCB22CF28C985789BBF6BF59314F1086D9E49897351C775EE81CF41
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_log
                                                                                    • String ID: d$|
                                                                                    • API String ID: 632333372-415524447
                                                                                    • Opcode ID: b41da94c8e0873fb31ce46b9bf1ec845f2d469f37e36bd2a55cc8f8885e561b5
                                                                                    • Instruction ID: dac03e427e93f591f5d1737f90c886445feec93ea56e6f6f32424ebbe55d5cce
                                                                                    • Opcode Fuzzy Hash: b41da94c8e0873fb31ce46b9bf1ec845f2d469f37e36bd2a55cc8f8885e561b5
                                                                                    • Instruction Fuzzy Hash: 50510970A04329DBDB26CF19C981799BBBABF55308F0481D9E958AB341D735EE81CF41
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_logsqlite3_value_text
                                                                                    • String ID: string or blob too big
                                                                                    • API String ID: 2320820228-2803948771
                                                                                    • Opcode ID: 4552165c49a92a3f1eebbde7746405f837ee0ef0562a3825501d2540ddfe4a5c
                                                                                    • Instruction ID: 1f8da1134a73d261049fdcd83983d84c916c8a3f87851362e697cdb17b1d2bab
                                                                                    • Opcode Fuzzy Hash: 4552165c49a92a3f1eebbde7746405f837ee0ef0562a3825501d2540ddfe4a5c
                                                                                    • Instruction Fuzzy Hash: F631D9B0A083249BCB25DF28C881799B7FABF69304F0085DAE898A7301D775DE81CF45
                                                                                    APIs
                                                                                    • sqlite3_aggregate_context.SQLITE3 ref: 60914096
                                                                                    • sqlite3_value_numeric_type.SQLITE3 ref: 609140A2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_aggregate_contextsqlite3_value_numeric_type
                                                                                    • String ID:
                                                                                    • API String ID: 3265351223-3916222277
                                                                                    • Opcode ID: 46809e466d9dc696839b8d734d1d71a7cd961db8d22299a3a9f395bc6b436a6c
                                                                                    • Instruction ID: a3c0f903ff645dd1c5a8146eaa2078e963ad6c1b8d1bbf61d5d4caeb1888773d
                                                                                    • Opcode Fuzzy Hash: 46809e466d9dc696839b8d734d1d71a7cd961db8d22299a3a9f395bc6b436a6c
                                                                                    • Instruction Fuzzy Hash: 19119EB0A0C6589BDF059F69C4D539A7BF6AF39308F0044E8D8D08B205E771CD94CB81
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_stricmp
                                                                                    • String ID: log
                                                                                    • API String ID: 912767213-2403297477
                                                                                    • Opcode ID: 32625358f7d37366d1c1d188942de81712d107425b8b720a67b4b84d1adec0cd
                                                                                    • Instruction ID: cbf508da25866b0a35bc2ca480d64d7c482f0664b0359b741109bd545b4f9ff5
                                                                                    • Opcode Fuzzy Hash: 32625358f7d37366d1c1d188942de81712d107425b8b720a67b4b84d1adec0cd
                                                                                    • Instruction Fuzzy Hash: FD11DAB07087048BE725AF66C49535EBBB3ABA1708F10C42CE4854B784C7BAC986DB42
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_strnicmp
                                                                                    • String ID: SQLITE_
                                                                                    • API String ID: 1961171630-787686576
                                                                                    • Opcode ID: 6b56a851e7df47422a7a29131339b4dfcb3302745a705f9abe90012807219487
                                                                                    • Instruction ID: 6d5ef3c0fd507030b5e8170497320435726bf3f0db30f2d6f2734bcd7f756fb3
                                                                                    • Opcode Fuzzy Hash: 6b56a851e7df47422a7a29131339b4dfcb3302745a705f9abe90012807219487
                                                                                    • Instruction Fuzzy Hash: 2501D6B190C3505FD7419F29CC8075BBFFAEBA5258F10486DE89687212D374DC81D781
                                                                                    APIs
                                                                                    • sqlite3_value_bytes.SQLITE3 ref: 6091A1DB
                                                                                    • sqlite3_value_blob.SQLITE3 ref: 6091A1FA
                                                                                    Strings
                                                                                    • Invalid argument to rtreedepth(), xrefs: 6091A1E3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_value_blobsqlite3_value_bytes
                                                                                    • String ID: Invalid argument to rtreedepth()
                                                                                    • API String ID: 1063208240-2843521569
                                                                                    • Opcode ID: 11a8b631faa983fdd1b04a57150add771201859657fb9a8a7ca9793758d49f10
                                                                                    • Instruction ID: c9489564a96cd83e586e3a08c251b8a8c74d553169181c25a19da25ffef599d7
                                                                                    • Opcode Fuzzy Hash: 11a8b631faa983fdd1b04a57150add771201859657fb9a8a7ca9793758d49f10
                                                                                    • Instruction Fuzzy Hash: 0FF0A4B2A0C2589BDB00AF2CC88255577A6FF24258F1045D9E9858F306EB34DDD5C7D1
                                                                                    APIs
                                                                                    • sqlite3_soft_heap_limit64.SQLITE3 ref: 609561D7
                                                                                      • Part of subcall function 6092A43E: sqlite3_initialize.SQLITE3 ref: 6092A450
                                                                                      • Part of subcall function 6092A43E: sqlite3_mutex_enter.SQLITE3 ref: 6092A466
                                                                                      • Part of subcall function 6092A43E: sqlite3_mutex_leave.SQLITE3 ref: 6092A47F
                                                                                      • Part of subcall function 6092A43E: sqlite3_memory_used.SQLITE3 ref: 6092A4BA
                                                                                    • sqlite3_soft_heap_limit64.SQLITE3 ref: 609561EB
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_soft_heap_limit64$sqlite3_initializesqlite3_memory_usedsqlite3_mutex_entersqlite3_mutex_leave
                                                                                    • String ID: soft_heap_limit
                                                                                    • API String ID: 1251656441-405162809
                                                                                    • Opcode ID: 0a3178e3d5348c0d1dba646aca47308acc52713326f376e4eba91e5107f5ba07
                                                                                    • Instruction ID: 8891d4bbc0f5aef5547f00e3070395c34840fc2012d087b050684f6162b0ba7d
                                                                                    • Opcode Fuzzy Hash: 0a3178e3d5348c0d1dba646aca47308acc52713326f376e4eba91e5107f5ba07
                                                                                    • Instruction Fuzzy Hash: C2014B71A083188BC710EF98D8417ADB7F2BFA5318F508629E8A49B394D730DC42CF41
                                                                                    APIs
                                                                                    • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A57F), ref: 6092522A
                                                                                    • sqlite3_log.SQLITE3(?,?,?,?,?,?,?,?,?,?,?,?,?,?,6094A57F), ref: 60925263
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: sqlite3_log
                                                                                    • String ID: NULL
                                                                                    • API String ID: 632333372-324932091
                                                                                    • Opcode ID: f56f6a0e8a895df1b0101c46b9851dc3af9ce5b0d95800d46be4b721d61d1ab1
                                                                                    • Instruction ID: 5a36de60e8574ea04015b231464f09686a41744340efbe7a8a869d8181b3dc96
                                                                                    • Opcode Fuzzy Hash: f56f6a0e8a895df1b0101c46b9851dc3af9ce5b0d95800d46be4b721d61d1ab1
                                                                                    • Instruction Fuzzy Hash: BAF0A070238301DBD7102FA6E44230E7AEBABB0798F48C43C95A84F289D7B5C844CB63
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterLeavefree
                                                                                    • String ID:
                                                                                    • API String ID: 4020351045-0
                                                                                    • Opcode ID: 13d179c58506242de641c1793229aaf6d73ae3266bd26a3d41fb94aeb54caf06
                                                                                    • Instruction ID: 980a39aab3b848caec2c27f45d5308e77b440585e3cd6ccd446b63c63d51e1b6
                                                                                    • Opcode Fuzzy Hash: 13d179c58506242de641c1793229aaf6d73ae3266bd26a3d41fb94aeb54caf06
                                                                                    • Instruction Fuzzy Hash: 2D018070B293058BDB10DF28C985919BBFBABB6308B20855CE499D7355D770DC80EB62
                                                                                    APIs
                                                                                    • EnterCriticalSection.KERNEL32(?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4DF
                                                                                    • TlsGetValue.KERNEL32(?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4F5
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D4FD
                                                                                    • LeaveCriticalSection.KERNEL32(?,?,?,?,6096D655,?,?,?,?,?,6096CF88), ref: 6096D520
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.3932894192.0000000060901000.00000020.00000001.01000000.0000000A.sdmp, Offset: 60900000, based on PE: true
                                                                                    • Associated: 00000003.00000002.3932876821.0000000060900000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933015202.000000006096E000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933037890.000000006096F000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933066334.000000006097B000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933087444.000000006097D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                    • Associated: 00000003.00000002.3933106793.0000000060980000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_60900000_megasoftdivxconverter.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                                                    • String ID:
                                                                                    • API String ID: 682475483-0
                                                                                    • Opcode ID: 79e4c3a08b5363d98cc33068bb7bbdcd271105d9d9d9c252471cf05fac27a945
                                                                                    • Instruction ID: 6dd43474153c21470d2d90641e64b96ed0da30414b2d41baa8b5e8831fa3fcb2
                                                                                    • Opcode Fuzzy Hash: 79e4c3a08b5363d98cc33068bb7bbdcd271105d9d9d9c252471cf05fac27a945
                                                                                    • Instruction Fuzzy Hash: 9AF0F972A163104BEB10AF659CC1A5A7BFDEFB1218F100048FC6197354E770DC40D6A2